<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.cyberdeigs.com/posts/Hack-The-Box-Dog/</loc>
<lastmod>2025-07-01T13:00:00-05:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Hack-The-Box-Nocturnal/</loc>
<lastmod>2025-08-22T13:00:00-05:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Hack-The-Box-Planning/</loc>
<lastmod>2025-09-04T13:00:00-05:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Hack-The-Box-Environment/</loc>
<lastmod>2025-09-10T13:00:00-05:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Huntress-CTF-2025-ARIKA/</loc>
<lastmod>2025-11-01T13:00:00-05:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Huntress-CTF-2025-Emotional/</loc>
<lastmod>2025-11-01T13:00:00-05:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Huntress-CTF-2025-Flag-Checker/</loc>
<lastmod>2025-11-01T13:00:00-05:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Huntress-CTF-2025-RFC-9309/</loc>
<lastmod>2025-11-01T18:00:00-05:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Huntress-CTF-2025-Tabbys-Date/</loc>
<lastmod>2025-11-06T17:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Advent-of-Cyber-2025-Day-1-Linux-CLI/</loc>
<lastmod>2025-12-01T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Holiday-Hack-Challenge-2025-Blob-Storage-Challenge-in-the-Neighborhood/</loc>
<lastmod>2025-12-01T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Holiday-Hack-Challenge-2025-Neighborhood-Watch-Bypass/</loc>
<lastmod>2025-12-01T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Holiday-Hack-Challenge-2025-Spare-Key/</loc>
<lastmod>2025-12-01T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Holiday-Hack-Challenge-2025-The-Open-Door/</loc>
<lastmod>2025-12-01T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/SANS-Holiday-Hack-Challenge-2025-Intro-to-nmap/</loc>
<lastmod>2025-12-01T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Advent-of-Cyber-2025-Day-2-Phishing/</loc>
<lastmod>2025-12-02T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Advent-of-Cyber-2025-Day-3-Splunk-Basics-Did-you-SIEM/</loc>
<lastmod>2025-12-03T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Advent-of-Cyber-2025-Day-5-Santas-Little-IDOR/</loc>
<lastmod>2025-12-05T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Advent-of-Cyber-2025-Day-6-Egg-xecutable/</loc>
<lastmod>2025-12-06T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Advent-of-Cyber-2025-Day-7-Scan-ta-Clause/</loc>
<lastmod>2025-12-07T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Advent-of-Cyber-2025-Day-9-A-Cracking-Christmas/</loc>
<lastmod>2025-12-09T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/posts/Advent-of-Cyber-2025-Day-11-Merry-XSSMas-Triage/</loc>
<lastmod>2025-12-11T12:00:00-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/about/</loc>
<lastmod>2026-01-08T16:44:31-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/</loc>
<lastmod>2026-01-08T16:44:31-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/</loc>
<lastmod>2026-01-08T16:44:31-06:00</lastmod>
</url>
<url>
<loc>https://www.cyberdeigs.com/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/web-app/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/penetration-testing/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/linux/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/easy-difficulty-machine/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/hackthebox/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/easy-difficulty/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/idor/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/command-injection/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/sql/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/sqlite/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/password-cracking/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/ssh/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/port-forwarding/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/cve-2023-46818/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/ispconfig/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/grafana/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/cve-2024-9264/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/docker/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/cronjob/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/privilege-escalation/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/mysql/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/medium/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/laravel/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/cve-2024-52301/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/file-upload/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/php/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/gpg/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/bash-env/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/huntress-ctf-2025/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/regex/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/python/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/code-review/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/burp-suite/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/ssti/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/server-side-template-injection/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/ejs/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/node-js/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/express-js/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/timing-attack/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/rate-limiting/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/ip-spoofing/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/brute-force/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/flask/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/warm-up/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/web/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/robots-txt/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/rfc/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/enumeration/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/flag-discovery/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/forensics/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/windows/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/notepad/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/utf-16-little-endian/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/strings/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/advent-of-cyber-2025/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/tryhackme/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/cli/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/command-line/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/bash/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/file-analysis/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/git/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/openssl/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/ctf/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/holiday-hack-challenge-2025/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/azure/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/cloud-security/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/blob-storage/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/misconfiguration/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/azure-cli/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/data-exposure/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/path-hijacking/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/sudo/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/sas-token/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/terraform/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/static-website/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/network-security-groups/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/rdp/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/firewall/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/nmap/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/network-scanning/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/port-scanning/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/service-enumeration/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/ncat/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/phishing/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/social-engineering/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/set/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/social-engineer-toolkit/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/credential-harvesting/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/red-team/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/email-security/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/splunk/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/siem/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/log-analysis/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/spl/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/incident-response/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/web-traffic-analysis/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/firewall-logs/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/path-traversal/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/ransomware/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/access-control/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/browser-developer-tools/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/authentication/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/authorization/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/malware-analysis/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/static-analysis/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/dynamic-analysis/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/pestudio/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/regshot/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/process-monitor/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/registry/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/persistence/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/ftp/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/dns/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/netcat/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/udp-scanning/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/pdfcrack/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/john-the-ripper/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/dictionary-attack/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/keepass/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/encrypted-files/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/zip/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/pdf/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/xss/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/cross-site-scripting/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/reflected-xss/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/stored-xss/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/tags/javascript/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/hackthebox/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/linux/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/huntress-ctf-2025/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/web/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/warm-up/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/forensics/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/advent-of-cyber-2025/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/holiday-hack-challenge-2025/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/cloud-security/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/reconnaissance/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/social-engineering/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/siem/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/malware-analysis/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/categories/password-cracking/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/page2/</loc>
</url>
<url>
<loc>https://www.cyberdeigs.com/page3/</loc>
</url>
</urlset>
