<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.exploitpaths.org/</loc>
    <lastmod>2026-04-24T15:59:21.395Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/</loc>
    <lastmod>2026-04-24T15:59:21.303Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/appendix-a/</loc>
    <lastmod>2026-04-24T15:59:21.271Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/capstone/</loc>
    <lastmod>2026-04-24T15:59:21.279Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-1/</loc>
    <lastmod>2026-04-24T15:59:21.283Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-2/</loc>
    <lastmod>2026-04-24T15:59:21.283Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-3/</loc>
    <lastmod>2026-04-24T15:59:21.287Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-4/</loc>
    <lastmod>2026-04-24T15:59:21.287Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-5/</loc>
    <lastmod>2026-04-24T15:59:21.291Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-6/</loc>
    <lastmod>2026-04-24T15:59:21.295Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-7/</loc>
    <lastmod>2026-04-24T15:59:21.299Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/course/module-8/</loc>
    <lastmod>2026-04-24T15:59:21.303Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/diagrams/</loc>
    <lastmod>2026-04-24T15:59:21.315Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/harness/</loc>
    <lastmod>2026-04-24T15:59:21.319Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/paper/</loc>
    <lastmod>2026-04-24T15:59:21.331Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/paper/exploit-path-construction/</loc>
    <lastmod>2026-04-24T15:59:21.327Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/posts/</loc>
    <lastmod>2026-04-24T15:59:21.339Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/posts/primitives-patterns-and-validation-loops/</loc>
    <lastmod>2026-04-24T15:59:21.339Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/posts/security-is-shifting-from-bugs-to-paths/</loc>
    <lastmod>2026-04-24T15:59:21.335Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/posts/the-breakthrough-is-workflow-not-magic/</loc>
    <lastmod>2026-04-24T15:59:21.335Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/privacy/</loc>
    <lastmod>2026-04-24T15:59:21.343Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/</loc>
    <lastmod>2026-04-24T15:59:21.371Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/</loc>
    <lastmod>2026-04-24T15:59:21.363Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/apache-apisix-route-bypass-and-sphere-crossing/</loc>
    <lastmod>2026-04-24T15:59:21.347Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/apache-http-server-path-traversal-to-execution/</loc>
    <lastmod>2026-04-24T15:59:21.347Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/apache-sling-path-traversal-to-execution/</loc>
    <lastmod>2026-04-24T15:59:21.351Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/apache-struts-input-to-execution/</loc>
    <lastmod>2026-04-24T15:59:21.351Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/reference/cases/dirty-cow-state-window-to-privilege-gain/</loc>
    <lastmod>2026-04-24T15:59:21.355Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/start-here/</loc>
    <lastmod>2026-04-24T15:59:21.375Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/terms/</loc>
    <lastmod>2026-04-24T15:59:21.375Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/thesis/</loc>
    <lastmod>2026-04-24T15:59:21.387Z</lastmod>
  </url>
  <url>
    <loc>https://www.exploitpaths.org/walkthrough/</loc>
    <lastmod>2026-04-24T15:59:21.391Z</lastmod>
  </url>
</urlset>
