<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.exploitpaths.org/</loc>
    <lastmod>2026-04-24T17:46:54.092Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/</loc>
    <lastmod>2026-04-24T17:46:54.036Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/appendix-a/</loc>
    <lastmod>2026-04-24T17:46:54.004Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/capstone/</loc>
    <lastmod>2026-04-24T17:46:54.008Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-1/</loc>
    <lastmod>2026-04-24T17:46:54.012Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-2/</loc>
    <lastmod>2026-04-24T17:46:54.016Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-3/</loc>
    <lastmod>2026-04-24T17:46:54.016Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-4/</loc>
    <lastmod>2026-04-24T17:46:54.020Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-5/</loc>
    <lastmod>2026-04-24T17:46:54.024Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-6/</loc>
    <lastmod>2026-04-24T17:46:54.028Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-7/</loc>
    <lastmod>2026-04-24T17:46:54.032Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-8/</loc>
    <lastmod>2026-04-24T17:46:54.032Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/diagrams/</loc>
    <lastmod>2026-04-24T17:46:54.044Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/harness/</loc>
    <lastmod>2026-04-24T17:46:54.048Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/paper/</loc>
    <lastmod>2026-04-24T17:46:54.056Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/paper/exploit-path-construction/</loc>
    <lastmod>2026-04-24T17:46:54.052Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/posts/</loc>
    <lastmod>2026-04-24T17:46:54.064Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/posts/primitives-patterns-and-validation-loops/</loc>
    <lastmod>2026-04-24T17:46:54.060Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/posts/security-is-shifting-from-bugs-to-paths/</loc>
    <lastmod>2026-04-24T17:46:54.056Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/posts/the-breakthrough-is-workflow-not-magic/</loc>
    <lastmod>2026-04-24T17:46:54.060Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/privacy/</loc>
    <lastmod>2026-04-24T17:46:54.064Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/</loc>
    <lastmod>2026-04-24T17:46:54.080Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/</loc>
    <lastmod>2026-04-24T17:46:54.076Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/apache-apisix-route-bypass-and-sphere-crossing/</loc>
    <lastmod>2026-04-24T17:46:54.068Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/apache-http-server-path-traversal-to-execution/</loc>
    <lastmod>2026-04-24T17:46:54.068Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/apache-sling-path-traversal-to-execution/</loc>
    <lastmod>2026-04-24T17:46:54.072Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/apache-struts-input-to-execution/</loc>
    <lastmod>2026-04-24T17:46:54.072Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/dirty-cow-state-window-to-privilege-gain/</loc>
    <lastmod>2026-04-24T17:46:54.072Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/start-here/</loc>
    <lastmod>2026-04-24T17:46:54.080Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/terms/</loc>
    <lastmod>2026-04-24T17:46:54.084Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/thesis/</loc>
    <lastmod>2026-04-24T17:46:54.084Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/walkthrough/</loc>
    <lastmod>2026-04-24T17:46:54.088Z</lastmod>
  </url>
</urlset>
