<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://ocelotsecurity.com/ntir-workshop/</loc><lastmod>2026-03-30T00:54:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/2024/07/23/password-protect-and-how-to-attack-it/</loc><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/07/pexels-photo-2882630.jpeg</image:loc><image:title>close up shot of keyboard buttons</image:title><image:caption>Photo by Miguel u00c1. Padriu00f1u00e1n on &lt;a href="https://www.pexels.com/photo/close-up-shot-of-keyboard-buttons-2882630/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/07/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/07/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/07/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/07/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/07/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/07/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/07/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/07/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/07/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-07-23T14:52:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2024/06/17/snowflake-and-responsibility-in-the-cloud/</loc><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/06/26225365267_3b66583c4f_b-1.jpg</image:loc><image:title>Macro Snowflake</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/24662369@N07/26225365267" rel="nofollow"&gt;Macro Snowflake&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/24662369@N07" rel="nofollow"&gt;NASA Goddard Photo and Video&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by-nd/2.0/" rel="nofollow"&gt;CC-BY-ND 2.0&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/06/26225365267_3b66583c4f_b.jpg</image:loc><image:title>Macro Snowflake</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/24662369@N07/26225365267" rel="nofollow"&gt;Macro Snowflake&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/24662369@N07" rel="nofollow"&gt;NASA Goddard Photo and Video&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by-nd/2.0/" rel="nofollow"&gt;CC-BY-ND 2.0&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2024/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-06-25T23:23:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/pen-test-workflow/</loc><lastmod>2022-11-29T19:17:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/pen-testing-azuread/</loc><lastmod>2022-11-29T19:02:36+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/using-a-vps-and-a-socks-proxy-to-forward-traffic/</loc><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-20.png</image:loc><image:title>image-20</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-19.png</image:loc><image:title>image-19</image:title></image:image><lastmod>2022-11-23T19:53:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/htb/</loc><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2021/02/pexels-photo-5935787.jpeg</image:loc><image:title>crop hacker typing on laptop with information on screen</image:title><image:caption>Photo by Sora Shimazaki on &lt;a href="https://www.pexels.com/photo/crop-hacker-typing-on-laptop-with-information-on-screen-5935787/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-11-23T19:52:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/techniques/</loc><lastmod>2022-11-14T15:26:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/password-spraying-with-burpsuite/</loc><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-18.png</image:loc><image:title>image-18</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2022-11-14T15:20:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/ccna-notes/</loc><lastmod>2022-11-03T20:18:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/cehv11/</loc><lastmod>2022-11-03T20:06:36+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/using-webex-to-transfer-files/</loc><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://ocelotsecurity.com/wp-content/uploads/2022/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-11-03T20:04:34+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/tryhackme-writeups/</loc><lastmod>2021-07-09T20:04:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com/2021/07/09/pre-security-path/</loc><lastmod>2021-07-09T20:03:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/06/28/nibbles/</loc><lastmod>2021-06-28T16:05:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/06/17/jerry/</loc><lastmod>2021-06-17T14:24:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/06/14/devel/</loc><lastmod>2021-06-15T01:11:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/06/14/blue/</loc><lastmod>2021-06-15T01:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/06/14/lame/</loc><lastmod>2021-06-15T00:54:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/06/14/legacy/</loc><lastmod>2021-06-15T00:39:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/28/a-simple-buffer-overflow/</loc><lastmod>2021-03-01T02:52:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/20/module-5-labs-1-2/</loc><lastmod>2021-02-20T21:15:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/20/module-4-lab-7/</loc><lastmod>2021-02-20T21:06:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/20/module-4-labs-1-6/</loc><lastmod>2021-02-20T21:04:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/14/ceh-module-3-labs-1-6/</loc><lastmod>2021-02-14T20:15:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/stabilize-the-shell/</loc><lastmod>2021-02-08T04:07:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/03/246/</loc><lastmod>2021-02-07T18:53:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/07/ceh-module-2-lab-9/</loc><lastmod>2021-02-07T18:52:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/07/certified-ethical-hacker-labs-2-8/</loc><lastmod>2021-02-07T18:43:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/reverse-shells/</loc><lastmod>2021-02-04T18:23:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/01/16/attacking-windows-7-with-eternal-blue/</loc><lastmod>2021-02-01T20:53:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/pickle-rick/</loc><lastmod>2021-02-01T20:45:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/tools/</loc><lastmod>2021-02-01T20:32:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/gobuster/</loc><lastmod>2021-02-01T20:32:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/services/</loc><lastmod>2021-02-01T20:30:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/nfs/</loc><lastmod>2021-02-01T20:29:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/mysql/</loc><lastmod>2021-02-01T20:28:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/privilege-escalation/</loc><lastmod>2021-02-01T20:21:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/abuse-lxd-to-elevate-priv/</loc><lastmod>2021-02-01T20:21:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/authentication-bypass/</loc><lastmod>2021-02-01T20:17:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/client-side-filter-bypass/</loc><lastmod>2021-02-01T20:17:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/02/01/php/</loc><lastmod>2021-02-01T20:12:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/2021/01/23/notes-test/</loc><lastmod>2021-01-23T21:26:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ocelotsecurity.com/labs/</loc><lastmod>2021-01-17T00:29:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ocelotsecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-30T00:54:14+00:00</lastmod></url></urlset>
