<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://exploitandchill.com/2025/08/08/detecting-lsass-credential-dumping-with-an-essential-defender-query/</loc><lastmod>2025-08-08T07:41:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/2025/07/02/hak5-rubber-ducky-one-of-the-most-iconic-tools-in-offensive-security-%f0%9f%90%a4%f0%9f%92%bb/</loc><image:image><image:loc>https://exploitandchill.com/wp-content/uploads/2025/07/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://exploitandchill.com/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-12T06:14:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/2025/06/21/what-it-was-like-getting-the-ejpt-elearnsecurity-junior-penetration-tester/</loc><image:image><image:loc>https://exploitandchill.com/wp-content/uploads/2025/06/scr-20250621-pwlp-2.png</image:loc><image:title>SCR-20250621-pwlp</image:title></image:image><image:image><image:loc>https://exploitandchill.com/wp-content/uploads/2025/06/scr-20250621-pwlp-1.png</image:loc><image:title>SCR-20250621-pwlp</image:title></image:image><image:image><image:loc>https://exploitandchill.com/wp-content/uploads/2025/06/scr-20250621-pwlp.png</image:loc><image:title>SCR-20250621-pwlp</image:title></image:image><lastmod>2025-06-22T01:08:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/2025/06/16/securely-wipe-free-space-on-macos-to-prevent-data-recovery/</loc><image:image><image:loc>https://exploitandchill.com/wp-content/uploads/2025/06/scr-20250616-hhoy.png</image:loc><image:title>SCR-20250616-hhoy</image:title></image:image><lastmod>2025-06-16T14:43:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/2025/06/14/i-bypassed-the-windows-11-defender-heres-how/</loc><image:image><image:loc>https://exploitandchill.com/wp-content/uploads/2025/06/hack.jpeg</image:loc><image:title>hack</image:title></image:image><image:image><image:loc>https://exploitandchill.com/wp-content/uploads/2025/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-06-15T00:46:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/2025/05/31/blueteaming-is-actually-addicting/</loc><lastmod>2025-05-31T19:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/2025/05/25/you-cant-secure-what-you-dont-understand-and-thats-why-cyber-isnt-entry-level/</loc><lastmod>2025-05-26T06:27:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/2025/05/16/pivoting-port-forwarding-ejpt-exam-preparation-ine/</loc><lastmod>2025-05-17T00:53:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/2025/05/10/finished-sans-sec504-hacker-tools-techniques-and-incident-handling/</loc><image:image><image:loc>https://exploitandchill.com/wp-content/uploads/2025/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-11T02:31:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/about/</loc><lastmod>2025-05-08T16:05:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://exploitandchill.com/2025/05/07/you-must-consider-these-three-things-before-starting-a-career-in-cybersec/</loc><lastmod>2025-05-07T18:41:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/2025/05/06/test/</loc><lastmod>2025-05-06T19:18:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com/2025/05/06/how-to-block-a-specific-port-in-windows-11-firewall-gui-powershell/</loc><lastmod>2025-05-06T19:05:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://exploitandchill.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-08-08T07:41:13+00:00</lastmod></url></urlset>
