<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://cyberwithpriyanshu.live</loc>
<lastmod>2026-03-20T08:21:49.086Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/about</loc>
<lastmod>2026-03-20T08:21:49.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/contact</loc>
<lastmod>2026-03-20T08:21:49.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/home-penetration-testing-lab</loc>
<lastmod>2026-03-18T17:02:29.987028+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/sql-injection-attacks-2026</loc>
<lastmod>2026-03-18T17:02:29.987028+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/top-10-osint-tools</loc>
<lastmod>2026-03-18T17:02:29.987028+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/my-journey-into-web-security-starting-with-http</loc>
<lastmod>2026-03-19T07:48:27.03443+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/my-understanding-of-curl-</loc>
<lastmod>2026-03-19T12:10:11.11086+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/obfuscation-and-deobfuscation</loc>
<lastmod>2026-03-19T12:11:24.617404+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/obfuscation-and-deobfuscation-part-2-</loc>
<lastmod>2026-03-19T12:12:39.215785+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/osint-basics-introduction-scope-and-ethical-boundaries-part-1</loc>
<lastmod>2026-03-19T12:13:50.462058+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/people-osint-finding-information-ethically-part-2</loc>
<lastmod>2026-03-19T12:14:37.702938+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/social-media-osint-platforms-process-and-ethics-part-3-</loc>
<lastmod>2026-03-19T12:15:41.042717+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/image-osint-finding-clues-hidden-in-plain-sight-part-4</loc>
<lastmod>2026-03-19T12:16:26.330154+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/video-osint-extracting-truth-from-moving-frames-part-5</loc>
<lastmod>2026-03-19T12:17:18.25291+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/geoint-seeing-the-world-through-coordinates-part-6</loc>
<lastmod>2026-03-19T12:21:32.836952+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/network-domain-osint-final-osint-post-part-7</loc>
<lastmod>2026-03-19T12:22:23.126055+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/from-osint-theory-to-building-my-first-tool</loc>
<lastmod>2026-03-19T12:24:01.361734+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/why-ip-address-instead-of-mac-address-</loc>
<lastmod>2026-03-19T12:25:23.882461+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/what-is-sam-file-and-how-it-is-used-for-penetration-testing-</loc>
<lastmod>2026-03-19T12:26:38.56088+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/from-first-release-to-better-release-confronting-my-tools-flaws</loc>
<lastmod>2026-03-19T12:28:28.587549+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/how-to-trace-an-email-the-real-guide-to-finding-an-ip-address</loc>
<lastmod>2026-03-19T12:30:01.244462+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/subdomain-enumeration-finding-the-hidden-attack-surface</loc>
<lastmod>2026-03-19T12:31:27.829108+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/setting-up-your-first-home-lab</loc>
<lastmod>2026-03-19T12:33:03.237989+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/how-to-install-metasloitable-2-and-connect-it-to-kali-linux-step-by-step</loc>
<lastmod>2026-03-19T12:35:00.335818+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/reconnaissance-phase-in-metaspliotable-2-using-kali-linux</loc>
<lastmod>2026-03-19T12:36:50.422854+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/metasploitable-2-vuln-analysis</loc>
<lastmod>2026-03-19T12:38:52.886989+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/exploitation-phase-in-metasploitable2-part-1-</loc>
<lastmod>2026-03-19T12:40:32.26224+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/nmap-for-network-reconnaissance-</loc>
<lastmod>2026-03-19T12:41:50.595208+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://cyberwithpriyanshu.live/blog/development-of-cybergpt-what-is-cybergpt-</loc>
<lastmod>2026-03-19T12:44:52.687003+00:00</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
