<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://w3nch.github.io/posts/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/cybersecurity/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/linux/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/linux-security/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/linux-security/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/python/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/python-tar-path-traversal-and-symlink-exploitation/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/security/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/symlink/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/</loc><lastmod>2026-03-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/analysis/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/bgp/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/bgp/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/how-iran-shut-down-the-internet-a-technical-analysis-of-centralized-network-control/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/meet-me-room/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/network/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/networking/</loc><lastmod>2026-02-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/blue-team/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/domain-impersonation/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/email-security/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/letsdefend/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/mx-record/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/phishing/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/phishing--digital-risk/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/soc/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/soc-writeups/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/alerts/soc326---impersonating-domain-mx-record-change-detected/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/endpoint-security/</loc><lastmod>2026-02-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/malware--endpoint/</loc><lastmod>2026-02-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/malware-analysis/</loc><lastmod>2026-02-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/powershell/</loc><lastmod>2026-02-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/alerts/soc153---suspicious-powershell-script-executedname/</loc><lastmod>2026-02-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/breaches/</loc><lastmod>2026-01-31T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/defensive-security/</loc><lastmod>2026-01-31T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/hashing/</loc><lastmod>2026-01-31T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/how-password-storage-fails-a-security-timeline-every-defender-should-know/</loc><lastmod>2026-01-31T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/identity-security/</loc><lastmod>2026-01-31T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/infosec/</loc><lastmod>2026-01-31T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/passwords/</loc><lastmod>2026-01-31T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/curiosity/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/experiments/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/hacking/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/learning/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/leetcode/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/sandbox/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/alerts/soc127-case-study-successful-sql-injection-attack-via-automated-tooling/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/sql-injection/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/sqli--rce/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/web-security/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/what-happens-if-you-import-os-on-leetcode/</loc><lastmod>2026-01-29T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/auditd/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/btlo/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/bruteforce/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/btlo/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/btlo/incident-response/paranoid/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/forensics/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/incident-response/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/incident-response/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/linux-forensics/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/privilege-escalation/</loc><lastmod>2026-01-28T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/macros/</loc><lastmod>2026-01-19T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/malware/</loc><lastmod>2026-01-19T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/malware-investigation/</loc><lastmod>2026-01-19T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/soc-analysis/</loc><lastmod>2026-01-19T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/alerts/soc205---malicious-macro-has-been-executed/</loc><lastmod>2026-01-19T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/coding/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/cyber-attacks/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/ddos/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/ddos-attacks-history-and-future/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/exercism/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/coding/exercism/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/htb/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/infrastructure/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/network-security/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/network-security/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/oop/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/htb/sherlock/sherlock/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/programming/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/programming-basics/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/python/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/coding/exercism/space-age/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/space-age/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/wireshark/</loc><lastmod>2026-01-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/blue/</loc><lastmod>2026-01-16T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/alerts/soc138---detected-suspicious-xls-file/</loc><lastmod>2026-01-16T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/macro/</loc><lastmod>2026-01-16T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/malware-analysis/</loc><lastmod>2026-01-16T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/xlsm/</loc><lastmod>2026-01-16T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/btlo/security-operations/gothamlegend-incident-response--powershell-malware-analysis/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/home-lab/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/home-lab/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/http/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/inside-a-blue-team-soc-home-lab-wazuh-pfsense-snort-suricata-and-zeek-in-action/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/pfsense/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/security-operations/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/snort/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/suricata/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/ticketing/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/wazuh/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/web/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/zeek/</loc><lastmod>2026-01-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/http-basics--auth/letsdefend-http-basic-authentication-analysis--pcap-investigation/</loc><lastmod>2026-01-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/network-forensics/</loc><lastmod>2026-01-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/pcap/</loc><lastmod>2026-01-14T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/command-injection/</loc><lastmod>2026-01-13T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/alerts/soc168---whoami-command-detected-in-request-body/</loc><lastmod>2026-01-13T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/web-security/</loc><lastmod>2026-01-13T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/web-attack/</loc><lastmod>2026-01-13T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/directory-traversal/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/alerts/soc170---passwd-found-in-requested-url---possible-lfi-attack/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/lfi/</loc><lastmod>2026-01-12T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/endpoint-security/</loc><lastmod>2026-01-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/exploitation/</loc><lastmod>2026-01-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/alerts/-soc335--cve-2024-49138-privilege-escalation-exploitation-analysis/</loc><lastmod>2026-01-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/windows/</loc><lastmod>2026-01-11T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/letsdefend/alerts/soc336---windows-ole-zero-click-rce-exploitation-detected-cve-2025-21298name-of-triggered-alert/</loc><lastmod>2026-01-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/ole/</loc><lastmod>2026-01-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/rce/</loc><lastmod>2026-01-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/zero-click/</loc><lastmod>2026-01-10T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/pentesting/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/wifi/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/wifi-hacking-101-to-1337/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/wireless-security/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/wireless-security/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/automation/</loc><lastmod>2026-01-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/building-a-custom-threat-intelligence-feed-with-n8n/</loc><lastmod>2026-01-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/coding/leetcode/test/</loc><lastmod>2026-01-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/coding/leetcode/</loc><lastmod>2026-01-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/n8n/</loc><lastmod>2026-01-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/security-operations/</loc><lastmod>2026-01-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/threat-intelligence/</loc><lastmod>2026-01-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/threat-intelligence/</loc><lastmod>2026-01-08T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/detection-engineering/</loc><lastmod>2026-01-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/detection-engineering/</loc><lastmod>2026-01-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/siem/</loc><lastmod>2026-01-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/sigma/</loc><lastmod>2026-01-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/sigma-rules-from-basics-to-advanced-detection-engineering/</loc><lastmod>2026-01-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/threat-detection/</loc><lastmod>2026-01-07T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/collaboration/</loc><lastmod>2025-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/development/</loc><lastmod>2025-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/devops/</loc><lastmod>2025-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/git/</loc><lastmod>2025-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/github/</loc><lastmod>2025-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/how-git-and-github-work-a-practical-guide-for-beginners/</loc><lastmod>2025-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/tools--workflows/</loc><lastmod>2025-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/version-control/</loc><lastmod>2025-02-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/automation/</loc><lastmod>2023-04-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/cli-tools/</loc><lastmod>2023-04-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/productivity/</loc><lastmod>2023-04-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/categories/projects/</loc><lastmod>2023-04-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/tags/student-life/</loc><lastmod>2023-04-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/posts/turning-text-into-handwritten-assignments-automating-the-boring-part/</loc><lastmod>2023-04-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/about/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/coding/codechef/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/contact/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/cyberdefenders/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/echoctf/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/picoctf/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://w3nch.github.io/writeups/thm/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>