<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://pentester.land/blog/make-nmap-list-its-most-common-ports/</loc><lastmod>2023-01-03T10:24:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/cypher-injection-cheatsheet/</loc><lastmod>2022-12-26T13:00:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/conf-notes-cypher-query-injection/</loc><lastmod>2022-11-29T15:30:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/mechanizing-the-methodology/</loc><lastmod>2022-11-22T09:00:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-newsletter-is-dead-long-live-the-newsletter/</loc><lastmod>2020-07-12T11:00:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-107/</loc><lastmod>2020-05-27T16:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-106/</loc><lastmod>2020-05-20T16:00:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-105/</loc><lastmod>2020-05-12T18:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-104/</loc><lastmod>2020-05-05T18:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-103/</loc><lastmod>2020-04-28T18:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-102/</loc><lastmod>2020-04-21T18:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-101/</loc><lastmod>2020-04-14T18:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-100/</loc><lastmod>2020-04-07T18:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-99/</loc><lastmod>2020-03-31T18:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-98/</loc><lastmod>2020-03-24T18:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-97/</loc><lastmod>2020-03-17T17:11:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-96/</loc><lastmod>2020-03-10T11:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-95/</loc><lastmod>2020-03-05T14:15:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-94/</loc><lastmod>2020-02-25T18:11:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-93/</loc><lastmod>2020-02-18T21:20:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-92/</loc><lastmod>2020-02-11T16:14:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-91/</loc><lastmod>2020-02-05T14:37:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-90/</loc><lastmod>2020-01-28T11:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-89/</loc><lastmod>2020-01-21T10:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-88/</loc><lastmod>2020-01-14T19:38:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-87/</loc><lastmod>2020-01-07T16:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-86/</loc><lastmod>2019-12-31T16:23:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-85/</loc><lastmod>2019-12-24T15:00:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-84/</loc><lastmod>2019-12-17T10:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-83/</loc><lastmod>2019-12-10T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-82/</loc><lastmod>2019-12-05T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-81/</loc><lastmod>2019-11-29T12:25:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-80/</loc><lastmod>2019-11-19T11:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-79/</loc><lastmod>2019-11-12T10:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-78/</loc><lastmod>2019-11-06T10:35:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-77/</loc><lastmod>2019-10-29T10:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-76/</loc><lastmod>2019-10-22T10:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-75/</loc><lastmod>2019-10-16T15:36:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-74/</loc><lastmod>2019-10-08T18:40:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-73/</loc><lastmod>2019-10-01T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-72/</loc><lastmod>2019-09-24T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-71/</loc><lastmod>2019-09-17T11:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-70/</loc><lastmod>2019-09-10T14:28:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-69/</loc><lastmod>2019-09-03T10:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-68/</loc><lastmod>2019-08-27T11:23:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-67/</loc><lastmod>2019-08-20T11:22:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-66/</loc><lastmod>2019-08-13T09:03:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-65/</loc><lastmod>2019-08-06T15:49:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-64/</loc><lastmod>2019-07-31T10:00:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-63/</loc><lastmod>2019-07-23T17:02:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-62/</loc><lastmod>2019-07-16T10:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-61/</loc><lastmod>2019-07-09T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-60/</loc><lastmod>2019-07-02T14:18:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-59/</loc><lastmod>2019-06-25T09:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-58/</loc><lastmod>2019-06-18T15:19:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-57/</loc><lastmod>2019-06-11T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-56/</loc><lastmod>2019-06-04T22:32:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-55/</loc><lastmod>2019-05-28T10:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-54/</loc><lastmod>2019-05-21T09:23:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-53/</loc><lastmod>2019-05-14T11:21:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-52/</loc><lastmod>2019-05-07T09:58:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-51/</loc><lastmod>2019-04-30T09:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-50/</loc><lastmod>2019-04-23T10:01:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-49/</loc><lastmod>2019-04-16T09:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/recon-resources/</loc><lastmod>2019-04-15T02:19:02+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/thinking-out-of-the-box-with-s0md3v/</loc><lastmod>2019-04-11T09:56:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-48/</loc><lastmod>2019-04-09T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/thinking-out-of-the-box-with-eraymitrani/</loc><lastmod>2019-04-04T14:47:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/thinking-out-of-the-box-with-gwendallecoguic/</loc><lastmod>2019-04-04T14:47:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-47/</loc><lastmod>2019-04-02T10:05:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-bug-hunter-podcast-05/</loc><lastmod>2019-04-01T19:13:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/thinking-out-of-the-box-with-edoverflow/</loc><lastmod>2019-03-28T10:20:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-46/</loc><lastmod>2019-03-26T10:48:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/compilation-of-recon-workflows/</loc><lastmod>2019-03-25T10:48:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/thinking-out-of-the-box-with-zseano/</loc><lastmod>2019-03-21T09:53:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-45/</loc><lastmod>2019-03-19T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-bug-hunter-podcast-04/</loc><lastmod>2019-03-18T18:08:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/owasp-stockholm-eliminating-false-assumptions-in-bug-bounties/</loc><lastmod>2019-03-14T23:02:20+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-44/</loc><lastmod>2019-03-12T10:34:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-bug-hunter-podcast-03/</loc><lastmod>2019-03-11T12:27:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/levelup-2019-api-security-101/</loc><lastmod>2019-03-08T21:57:18+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-43/</loc><lastmod>2019-03-05T09:01:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-bug-hunter-podcast-02/</loc><lastmod>2019-03-01T11:22:55+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-42/</loc><lastmod>2019-02-26T09:18:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-bug-hunter-podcast-01/</loc><lastmod>2019-02-22T15:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-41/</loc><lastmod>2019-02-19T11:19:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-40/</loc><lastmod>2019-02-12T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-39/</loc><lastmod>2019-02-05T08:07:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-38/</loc><lastmod>2019-01-29T10:12:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-37/</loc><lastmod>2019-01-22T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-36/</loc><lastmod>2019-01-15T08:08:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-35/</loc><lastmod>2019-01-08T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-34/</loc><lastmod>2019-01-01T17:06:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-33/</loc><lastmod>2018-12-25T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-32/</loc><lastmod>2018-12-18T16:58:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-31/</loc><lastmod>2018-12-10T19:37:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-30/</loc><lastmod>2018-12-03T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-29/</loc><lastmod>2018-11-27T15:57:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-28/</loc><lastmod>2018-11-19T19:26:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/subdomains-enumeration-cheatsheet/</loc><lastmod>2018-11-14T23:10:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-27/</loc><lastmod>2018-11-12T18:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/5-kali-linux-tricks-that-you-may-not-know/</loc><lastmod>2018-11-09T19:17:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/5-tips-to-make-the-most-of-twitter-as-a-pentester-or-bug-bounty-hunter/</loc><lastmod>2018-11-09T19:17:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/owasp-stockholm-how-to-differentiate-yourself-as-a-bug-bounty-hunter/</loc><lastmod>2018-11-07T13:18:18+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-26/</loc><lastmod>2018-11-05T18:39:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/open-redirect-cheatsheet/</loc><lastmod>2018-11-02T23:59:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/5-things-I-wish-I-knew-when-I-started-as-a-junior-penetration-tester/</loc><lastmod>2018-10-31T15:47:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-25/</loc><lastmod>2018-10-29T08:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-24/</loc><lastmod>2018-10-21T16:39:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/installing-arm-android-apps-on-genymotion-devices/</loc><lastmod>2018-10-19T10:30:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/levelup-2018-practical-recon-techniques-for-bug-hunters-and-pentesters/</loc><lastmod>2018-10-17T13:18:18+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-23/</loc><lastmod>2018-10-14T17:06:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/list-of-intentionally-vulnerable-android-apps/</loc><lastmod>2018-10-10T10:56:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-22/</loc><lastmod>2018-10-08T17:06:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-21/</loc><lastmod>2018-10-01T10:06:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-20/</loc><lastmod>2018-09-25T19:01:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-19/</loc><lastmod>2018-09-17T00:18:31+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-18/</loc><lastmod>2018-09-03T16:40:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-17/</loc><lastmod>2018-08-27T17:06:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/source-code-disclosure-via-exposed-git-folder/</loc><lastmod>2018-08-25T14:59:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-16/</loc><lastmod>2018-08-19T17:06:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/cloud-vps-providers-for-bug-hunters/</loc><lastmod>2018-08-16T11:04:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-15/</loc><lastmod>2018-08-13T13:11:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-14/</loc><lastmod>2018-08-05T17:51:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-13/</loc><lastmod>2018-07-29T14:22:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/bug-bounty-talks-2017-automation-for-bug-hunters/</loc><lastmod>2018-07-25T09:20:18+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/how-to-fail-at-bug-bounty-hunting/</loc><lastmod>2018-07-19T11:43:19+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-12/</loc><lastmod>2018-07-16T14:22:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/area-41-2018-modern-pentest-tricks-for-faster-wider-greater-engagements/</loc><lastmod>2018-07-12T10:00:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/owasp-broken-web-apps-owasp-bricks-challenge-walkthrough/</loc><lastmod>2018-07-10T11:19:30+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-11/</loc><lastmod>2018-07-09T15:35:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/levelup-2018-small-files-and-big-bounties-exploiting-sensitive-files/</loc><lastmod>2018-07-04T10:35:18+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/installing-the-latest-pentest-tools-from-defcon-26-demo-labs/</loc><lastmod>2018-07-02T10:38:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/bugbounty-talks-2018-how-to-become-a-bug-hunter/</loc><lastmod>2018-07-01T19:50:20+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/vulnhub-Bsides-Vancouver-2018-walkthrough/</loc><lastmod>2018-06-27T19:26:30+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/How-to-get-the-IP-address-of-a-downloaded-vulnerable-machine/</loc><lastmod>2018-06-26T09:46:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-10/</loc><lastmod>2018-06-24T10:12:15+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-9/</loc><lastmod>2018-06-24T10:12:15+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/levelup-2018-the-bug-hunters-methodology-v3/</loc><lastmod>2018-06-19T10:09:20+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/levelup-2018-Trickle-Down-PwnOnomics/</loc><lastmod>2018-06-19T10:09:20+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-8/</loc><lastmod>2018-06-18T10:18:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-7/</loc><lastmod>2018-06-11T10:13:41+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-6/</loc><lastmod>2018-06-01T10:17:41+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-5/</loc><lastmod>2018-05-23T15:18:24+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-4/</loc><lastmod>2018-05-16T11:18:24+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/vulnhub-jis-ctf-vulnupload-walkthrough/</loc><lastmod>2018-05-15T10:17:30+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/levelup-2017-doing-recon-like-a-boss-disobey-2018-its-the-little-things/</loc><lastmod>2018-04-26T10:12:20+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/levelup-2017-Esoteric-subdomain-enumeration-techniques/</loc><lastmod>2018-04-25T10:09:20+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-3/</loc><lastmod>2018-03-19T17:45:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/vulnerability-databases-of-commercial-scanners/</loc><lastmod>2018-03-16T21:00:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-2/</loc><lastmod>2018-03-15T16:23:15+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/lessons-learned-from-vulnhub-drunk-admin/</loc><lastmod>2018-03-08T13:42:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/vulnhub-derpnstink-1-walkthrough/</loc><lastmod>2018-03-08T11:42:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/the-5-hacking-newsletter-1/</loc><lastmod>2018-03-04T21:00:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/vulnhub-drunk-admin-walkthrough/</loc><lastmod>2018-03-04T20:00:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/how-to-scan-all-ports-with-nmap/</loc><lastmod>2018-02-21T10:21:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/categories/articles/</loc><lastmod>2023-01-03T10:24:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/categories/</loc><lastmod>2023-01-03T10:24:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/</loc><lastmod>2023-01-03T10:24:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/tips/</loc><lastmod>2023-01-03T10:24:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/bug-bounty/</loc><lastmod>2022-12-26T13:00:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/cheatsheets/</loc><lastmod>2022-12-26T13:00:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/categories/cheatsheets/</loc><lastmod>2022-12-26T13:00:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/vulnerabilities/</loc><lastmod>2022-12-26T13:00:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/web-hacking/</loc><lastmod>2022-12-26T13:00:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/conference-notes/</loc><lastmod>2022-11-29T15:30:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/categories/conference-notes/</loc><lastmod>2022-11-29T15:30:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/recon/</loc><lastmod>2022-11-22T09:00:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/sponsor/</loc><lastmod>2022-09-10T22:07:30+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/writeups/</loc><lastmod>2022-09-10T15:00:43+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/kb/versions/</loc><lastmod>2021-09-24T08:50:23+02:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/blog/</loc><lastmod>2020-10-06T08:49:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/</loc><lastmod>2020-10-06T08:47:36+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/contact/</loc><lastmod>2020-08-27T19:25:12+02:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/site-news/</loc><lastmod>2020-07-12T11:00:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/categories/site-news/</loc><lastmod>2020-07-12T11:00:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/newsletter/</loc><lastmod>2020-05-27T16:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/categories/newsletter/</loc><lastmod>2020-05-27T16:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/resources/</loc><lastmod>2020-05-27T16:44:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/interviews/</loc><lastmod>2019-04-11T09:56:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/non-technical/</loc><lastmod>2019-04-11T09:56:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/podcast/</loc><lastmod>2019-04-01T19:13:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/categories/podcast/</loc><lastmod>2019-04-01T19:13:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/pentest/</loc><lastmod>2019-03-11T12:27:45+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/api-hacking/</loc><lastmod>2019-03-08T21:57:18+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/productivity/</loc><lastmod>2018-11-09T19:17:25+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/mobile-app-hacking/</loc><lastmod>2018-10-19T10:30:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/tutorials/</loc><lastmod>2018-08-25T14:59:00+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/mobile-hacking/</loc><lastmod>2018-07-25T09:20:18+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/tags/challenge-walkthroughs/</loc><lastmod>2018-07-10T11:19:30+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://pentester.land/categories/writeups/</loc><lastmod>2018-07-10T11:19:30+01:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>