<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>/posts/cop-htb/</loc>
<lastmod>2022-12-21T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/precious_htb/</loc>
<lastmod>2022-12-23T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/neonify_htb/</loc>
<lastmod>2022-12-26T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/soccer_htb/</loc>
<lastmod>2022-12-29T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/stocker_htb/</loc>
<lastmod>2023-01-21T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/templated_htb/</loc>
<lastmod>2023-08-01T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/sau_htb/</loc>
<lastmod>2023-08-02T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/pilgrimage_htb/</loc>
<lastmod>2023-08-05T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/monitorstwo_htb/</loc>
<lastmod>2023-08-06T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/a-tale-of-finding-an-interesting-xss/</loc>
<lastmod>2023-08-14T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/analytical_htb/</loc>
<lastmod>2023-10-21T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/clicker_htb/</loc>
<lastmod>2023-10-28T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/sandworm_htb/</loc>
<lastmod>2023-11-04T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/timelapse_htb/</loc>
<lastmod>2024-04-02T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/return_htb/</loc>
<lastmod>2024-04-04T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/driver_htb/</loc>
<lastmod>2024-04-08T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/toolbox_htb/</loc>
<lastmod>2024-04-13T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/posts/servmon_htb/</loc>
<lastmod>2024-04-15T00:00:00+05:30</lastmod>
</url>
<url>
<loc>/categories/</loc>
<lastmod>2025-03-14T16:13:37+05:30</lastmod>
</url>
<url>
<loc>/tags/</loc>
<lastmod>2025-03-14T16:13:37+05:30</lastmod>
</url>
<url>
<loc>/archives/</loc>
<lastmod>2025-03-14T16:13:37+05:30</lastmod>
</url>
<url>
<loc>/about/</loc>
<lastmod>2025-03-14T16:13:37+05:30</lastmod>
</url>
<url>
<loc>/</loc>
</url>
<url>
<loc>/tags/sql-injection/</loc>
</url>
<url>
<loc>/tags/pickle/</loc>
</url>
<url>
<loc>/tags/insecure-deserialization/</loc>
</url>
<url>
<loc>/tags/os-command-injection/</loc>
</url>
<url>
<loc>/tags/yaml/</loc>
</url>
<url>
<loc>/tags/ruby/</loc>
</url>
<url>
<loc>/tags/ssti/</loc>
</url>
<url>
<loc>/tags/regex-bypass/</loc>
</url>
<url>
<loc>/tags/file-upload-vulnerability/</loc>
</url>
<url>
<loc>/tags/tiny-file-manager-rce/</loc>
</url>
<url>
<loc>/tags/websockets/</loc>
</url>
<url>
<loc>/tags/blind-sqli/</loc>
</url>
<url>
<loc>/tags/dstat-exploit/</loc>
</url>
<url>
<loc>/tags/nosql-injection/</loc>
</url>
<url>
<loc>/tags/arbitrary-file-read/</loc>
</url>
<url>
<loc>/tags/nodejs/</loc>
</url>
<url>
<loc>/tags/ssti/</loc>
</url>
<url>
<loc>/tags/server-side-template-injection/</loc>
</url>
<url>
<loc>/tags/cve-2023-27163/</loc>
</url>
<url>
<loc>/tags/blind-os-command-injection/</loc>
</url>
<url>
<loc>/tags/exploiting-sudo-rights/</loc>
</url>
<url>
<loc>/tags/git-exposure/</loc>
</url>
<url>
<loc>/tags/cve-2022-44268/</loc>
</url>
<url>
<loc>/tags/imagemagick-vulnerability/</loc>
</url>
<url>
<loc>/tags/cve-2022-4510/</loc>
</url>
<url>
<loc>/tags/binwalk-vulnerability/</loc>
</url>
<url>
<loc>/tags/cve-2022-46169/</loc>
</url>
<url>
<loc>/tags/cacti-exploit/</loc>
</url>
<url>
<loc>/tags/docker-breakout/</loc>
</url>
<url>
<loc>/tags/cve-2021-41091/</loc>
</url>
<url>
<loc>/tags/docker-privilege-escalation/</loc>
</url>
<url>
<loc>/tags/xss/</loc>
</url>
<url>
<loc>/tags/metabase-pre-auth-rce/</loc>
</url>
<url>
<loc>/tags/gameoverlay-ubuntu-exploit/</loc>
</url>
<url>
<loc>/tags/cve-2023-2640/</loc>
</url>
<url>
<loc>/tags/cve-2023-32629/</loc>
</url>
<url>
<loc>/tags/nfs-enumeration/</loc>
</url>
<url>
<loc>/tags/broken-access-control/</loc>
</url>
<url>
<loc>/tags/file-write-to-rce/</loc>
</url>
<url>
<loc>/tags/env-variables-hacking/</loc>
</url>
<url>
<loc>/tags/pgp/</loc>
</url>
<url>
<loc>/tags/sandbox-bypass/</loc>
</url>
<url>
<loc>/tags/rust/</loc>
</url>
<url>
<loc>/tags/cve-2021-31214/</loc>
</url>
<url>
<loc>/tags/firejail/</loc>
</url>
<url>
<loc>/tags/winrm-passwordless-authentication/</loc>
</url>
<url>
<loc>/tags/hardcoded-credentials/</loc>
</url>
<url>
<loc>/tags/laps-credential-dumping/</loc>
</url>
<url>
<loc>/tags/network-printer-abuse/</loc>
</url>
<url>
<loc>/tags/sebackupprivilege-abuse/</loc>
</url>
<url>
<loc>/tags/server-operators-group-abuse/</loc>
</url>
<url>
<loc>/tags/scf-file-upload/</loc>
</url>
<url>
<loc>/tags/printnightmare/</loc>
</url>
<url>
<loc>/tags/cve-2019-9193/</loc>
</url>
<url>
<loc>/tags/boot2docker/</loc>
</url>
<url>
<loc>/tags/directory-traversal/</loc>
</url>
<url>
<loc>/tags/cve-2019-20085/</loc>
</url>
<url>
<loc>/tags/nsclient-local-privilege-escalation/</loc>
</url>
<url>
<loc>/categories/writeups/</loc>
</url>
<url>
<loc>/page2/</loc>
</url>
</urlset>
