<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.hacksplaining.com/</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/teams</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/pci</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/owasp</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/book</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/terms</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/privacy</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/sql-injection/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/xss-stored/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/command-execution/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/click-jacking/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/csrf/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/directory-traversal/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/xss-reflected/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/xss-dom/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/file-upload/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/broken-access-control/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/open-redirects/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/unencrypted-communication/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/user-enumeration/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/information-leakage/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/password-mismanagement/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/privilege-escalation/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/session-fixation/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/weak-session/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/xml-bombs/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/xml-external-entities/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/denial-of-service-attacks/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/email-spoofing/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/malvertising/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/lax-security-settings/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/toxic-dependencies/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/logging-and-monitoring/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/buffer-overflows/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/ssrf/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/host-header-poisoning/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/insecure-design/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/mass-assignment/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/prototype-pollution/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/regex-injection/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/remote-code-execution/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/xssi/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/downgrade-attacks/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/dns-poisoning/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/ssl-stripping/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/subdomain-squatting/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/ai-data-extraction-attacks/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/ai-prompt-injection/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/lessons/ai-bias-and-unreliability/start</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/botnets</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/brute-force-attacks</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/clean-urls</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/code-injection</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/content-management-systems</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/cookies</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/ddl</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/defense-in-depth</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/denial-of-service-attacks</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/dictionary-attacks</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/digital-signatures</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/dml</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/hashing</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/http</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/https</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/ldap</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/netmasks</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/oauth</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/owasp</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/password-lists</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/phishing</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/principle-of-least-privilege</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/randomness</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/releases</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/rest</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/salting</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/sessions</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/social-engineering</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/sql</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/urls</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/worms</loc>
  </url>
  <url>
    <loc>https://www.hacksplaining.com/glossary/zero-day-exploits</loc>
  </url>
</urlset>