<?xml version="1.0" encoding="utf-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://hackthecore.com/index.html</loc></url>
<url><loc>https://hackthecore.com/academy.html</loc></url>
<url><loc>https://hackthecore.com/pentest.html</loc></url>
<url><loc>https://hackthecore.com/foundations.html</loc></url>
<url><loc>https://hackthecore.com/network.html</loc></url>
<url><loc>https://hackthecore.com/privilege-escalation.html</loc></url>
<url><loc>https://hackthecore.com/web-application.html</loc></url>
<url><loc>https://hackthecore.com/wireless.html</loc></url>
<url><loc>https://hackthecore.com/social-engineering.html</loc></url>
<url><loc>https://hackthecore.com/source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/secure-coding.html</loc></url>
<url><loc>https://hackthecore.com/advanced-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/exploit-development.html</loc></url>
<url><loc>https://hackthecore.com/reverse-engineering.html</loc></url>
<url><loc>https://hackthecore.com/reporting.html</loc></url>
<url><loc>https://hackthecore.com/knowledge.html</loc></url>
<url><loc>https://hackthecore.com/exam.html</loc></url>
<url><loc>https://hackthecore.com/access.html</loc></url>
<url><loc>https://hackthecore.com/node.html</loc></url>
<url><loc>https://hackthecore.com/protocol.html</loc></url>
<url><loc>https://hackthecore.com/signal.html</loc></url>
<url><loc>https://hackthecore.com/exam-node.html</loc></url>
<url><loc>https://hackthecore.com/guides.html</loc></url>
<url><loc>https://hackthecore.com/hacking.html</loc></url>
<url><loc>https://hackthecore.com/infra.html</loc></url>
<url><loc>https://hackthecore.com/pentest-cheatsheets.html</loc></url>
<url><loc>https://hackthecore.com/pentest-checklists.html</loc></url>
<url><loc>https://hackthecore.com/pentest-privesc.html</loc></url>
<url><loc>https://hackthecore.com/pentest-qa.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/penetration-test-workflow.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/penetration-test-workflow.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/why-run-a-penetration-test-at-all.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/permission-to-attack.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/pentesting-standards.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/how-to-define-scope-with-the-client.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/what-does-an-nda-look-like.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/pta-scope-nda-filling-out.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/third-party-consent-declaration.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/the-7-phases-of-a-penetration-test.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/university-yes-or-no.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/security-conferences-yes-or-no.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/pentesting-effort-time-budget.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/pentesting-insurance.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/taking-notes.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/ejpt-junior-pentesting-certification.html</loc></url>
<url><loc>https://hackthecore.com/briefs/foundations/pentesting-certifications.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/introduction.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/network-pentesting-theory.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/network-pentesting-practice.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/password-cracking.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/active-directory-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/active-directory-pentesting-quick-reference.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/c2-frameworks.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/thick-client-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/exploit-pack.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/persistence.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/pivoting-and-portforwarding.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/powerview-quick-reference.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/cobalt-strike-quick-reference.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/quick-reference.html</loc></url>
<url><loc>https://hackthecore.com/briefs/network/eptp-pentesting-certification.html</loc></url>
<url><loc>https://hackthecore.com/briefs/privilege-escalation/introduction.html</loc></url>
<url><loc>https://hackthecore.com/briefs/privilege-escalation/the-goal-of-privilege-escalation.html</loc></url>
<url><loc>https://hackthecore.com/briefs/privilege-escalation/linux-privilege-escalation.html</loc></url>
<url><loc>https://hackthecore.com/briefs/privilege-escalation/windows-privilege-escalation.html</loc></url>
<url><loc>https://hackthecore.com/briefs/privilege-escalation/macos-privilege-escalation.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/introduction.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/owasp-top-10-and-web-application-pentesting-theory.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/web-application-pentesting-practice.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/browser-exploitation-framework-beef.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/burp-suite-professional.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/web-application-firewall-bypass.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/web-vulnerability-assessment-burp-enterprise.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/web-vulnerability-assessment-with-acunetix.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/web-vulnerability-assessment-with-netsparker.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/web-vulnerability-assessment-with-intruder-io.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/web-vulnerability-assessment-with-rapid7-appspider.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/quick-reference.html</loc></url>
<url><loc>https://hackthecore.com/briefs/web-application/ewpt-web-pentesting-certification.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/introduction.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/wireless-pentesting-adapter.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/wifi-pineapple.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/wep-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/sigint-with-kismet.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/packet-analysis-with-wireshark.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/wpa2-enterprise-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/wps-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/krack-attack.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/karmetasploit-attack.html</loc></url>
<url><loc>https://hackthecore.com/briefs/wireless/oswp-wireless-pentesting-certification.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/introduction.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/social-engineering.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/red-teaming.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/phishing-practice.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/password-profiling.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/lock-picking.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/google-dorks.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/external-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/osint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/osint-with-maltego-pro.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/sigint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/humint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/geoint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/website-osint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/username-osint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/password-osint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/e-mail-osint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/image-osint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/business-osint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/phone-osint.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/hak5-tools.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/rubber-ducky.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/media-dropping.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/network-implants.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/anti-virus-evasion-basics.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/rfid-cloning-with-keysy.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/digispark.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/osint-quick-reference.html</loc></url>
<url><loc>https://hackthecore.com/briefs/social-engineering/chatgpt-for-pentesters.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/foundations-and-automated-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/c-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/java-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/c-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/php-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/node-js-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/python-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/go-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/ruby-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/ios-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/android-source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/source-code-auditing/artifacts-git-docker-and-dependency-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/secure-coding/taking-ownership-of-software-security.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/introduction.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/owasp-mobile-top-10.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/mobile-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/owasp-api-top-10.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/api-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/jwt-token-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/ms-exchange-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/cloud-pentesting-azure-aws-gcp.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/iot-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/ot-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/game-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/sap-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/llm-large-language-models-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/vulnerability-assessment-with-nessus.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/vulnerability-assessment-with-openvas.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/vulnerability-assessment-with-nexpose-and-metasploit-pro.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/tenable-io.html</loc></url>
<url><loc>https://hackthecore.com/briefs/advanced-pentesting/emapt-mobile-pentesting-certification.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/introduction.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/shell-codes-payloads-build-your-own-linux-shellcoding.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/python-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/go-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/bash-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/powershell-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/ruby-pentesting.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/exploit-analysis.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/format-string-exploitation.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/building-a-metasploit-exploit.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/finding-opcodes.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/macos-shellcoding.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/windows-shellcoding.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/developing-exploit-pack-exploits.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/av-edr-evasion-programming.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/programming-malicious-office-macros.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/ecxd-exploit-development-certification.html</loc></url>
<url><loc>https://hackthecore.com/briefs/exploit-development/quick-reference.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/introduction.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/source-code-auditing.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/x86-assembly-basics-theory.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/x86-assembly-basics-practice.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/reverse-engineering-basics.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/reverse-engineering-basics-with-ghidra.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/buffer-overflow-theory.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/windows-bufferoverflow-reverse-engineering.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/linux-bufferoverflow-reverse-engineering.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/macos-reverse-engineering.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/reverse-engineering-with-radare2.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/arm-reverse-engineering.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/binary-ninja.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/anti-reverse-engineering-and-obfuscation.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/radare2-quick-reference.html</loc></url>
<url><loc>https://hackthecore.com/briefs/reverse-engineering/ecre-reverse-engineering-certification.html</loc></url>
<url><loc>https://hackthecore.com/reporting.html</loc></url>
<url><loc>https://hackthecore.com/ai-security.html</loc></url>
<url><loc>https://hackthecore.com/briefs/ai-security/ai-attack-surface-primer.html</loc></url>
<url><loc>https://hackthecore.com/briefs/ai-security/prompt-injection-and-jailbreaks.html</loc></url>
<url><loc>https://hackthecore.com/briefs/ai-security/rag-agent-and-tool-abuse.html</loc></url>
<url><loc>https://hackthecore.com/briefs/ai-security/model-api-and-inference-security.html</loc></url>
<url><loc>https://hackthecore.com/briefs/ai-security/ai-red-teaming-methodology.html</loc></url>
<url><loc>https://hackthecore.com/drone-robotics-security.html</loc></url>
<url><loc>https://hackthecore.com/cloud-offensive-security.html</loc></url><url><loc>https://hackthecore.com/api-security.html</loc></url><url><loc>https://hackthecore.com/mobile-app-pentesting.html</loc></url><url><loc>https://hackthecore.com/identity-sso-abuse.html</loc></url><url><loc>https://hackthecore.com/adversary-emulation-tradecraft.html</loc></url><url><loc>https://hackthecore.com/devsecops-supply-chain.html</loc></url><url><loc>https://hackthecore.com/ot-ics-security.html</loc></url><url><loc>https://hackthecore.com/briefs/cloud-offensive-security/cloud-control-plane-abuse.html</loc></url><url><loc>https://hackthecore.com/briefs/cloud-offensive-security/kubernetes-and-container-escape-paths.html</loc></url><url><loc>https://hackthecore.com/briefs/cloud-offensive-security/cloud-identity-and-saas-trust.html</loc></url><url><loc>https://hackthecore.com/briefs/cloud-offensive-security/iac-pipelines-and-cloud-drift.html</loc></url><url><loc>https://hackthecore.com/briefs/api-security/rest-and-http-assumptions.html</loc></url><url><loc>https://hackthecore.com/briefs/api-security/graphql-jwt-and-oauth.html</loc></url><url><loc>https://hackthecore.com/briefs/api-security/bola-bfla-and-object-abuse.html</loc></url><url><loc>https://hackthecore.com/briefs/api-security/api-fuzzing-and-rate-controls.html</loc></url><url><loc>https://hackthecore.com/briefs/mobile-app-pentesting/android-and-ios-testing-flow.html</loc></url><url><loc>https://hackthecore.com/briefs/mobile-app-pentesting/dynamic-instrumentation-with-frida.html</loc></url><url><loc>https://hackthecore.com/briefs/mobile-app-pentesting/tls-pinning-storage-and-deep-links.html</loc></url><url><loc>https://hackthecore.com/briefs/mobile-app-pentesting/mobile-reverse-engineering.html</loc></url><url><loc>https://hackthecore.com/briefs/identity-sso-abuse/token-theft-and-session-replay.html</loc></url><url><loc>https://hackthecore.com/briefs/identity-sso-abuse/oauth-consent-and-federation-abuse.html</loc></url><url><loc>https://hackthecore.com/briefs/identity-sso-abuse/tenant-misconfiguration-and-scim-drift.html</loc></url><url><loc>https://hackthecore.com/briefs/identity-sso-abuse/conditional-access-and-sso-attack-paths.html</loc></url><url><loc>https://hackthecore.com/briefs/adversary-emulation-tradecraft/payload-staging-and-opsec.html</loc></url><url><loc>https://hackthecore.com/briefs/adversary-emulation-tradecraft/av-and-edr-evasion-concepts.html</loc></url><url><loc>https://hackthecore.com/briefs/adversary-emulation-tradecraft/custom-tooling-and-c2-tradecraft.html</loc></url><url><loc>https://hackthecore.com/briefs/adversary-emulation-tradecraft/client-side-chaining.html</loc></url><url><loc>https://hackthecore.com/briefs/devsecops-supply-chain/git-secrets-and-repo-sprawl.html</loc></url><url><loc>https://hackthecore.com/briefs/devsecops-supply-chain/pipeline-and-runner-compromise.html</loc></url><url><loc>https://hackthecore.com/briefs/devsecops-supply-chain/package-trust-signing-and-sbom.html</loc></url><url><loc>https://hackthecore.com/briefs/devsecops-supply-chain/gitops-iac-and-build-systems.html</loc></url><url><loc>https://hackthecore.com/briefs/ot-ics-security/industrial-protocols-modbus-and-dnp3.html</loc></url><url><loc>https://hackthecore.com/briefs/ot-ics-security/plc-hmi-and-engineering-workstations.html</loc></url><url><loc>https://hackthecore.com/briefs/ot-ics-security/segmentation-safety-and-process-manipulation.html</loc></url><url><loc>https://hackthecore.com/briefs/ot-ics-security/ot-engagement-constraints.html</loc></url></urlset>