<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://blog.cyberethical.me</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>always</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-business-2025-blackout-drivers-shadow</loc>
    <lastmod>2025-05-27T13:00:21.531Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-sherlock-noted</loc>
    <lastmod>2025-04-14T07:00:24.364Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-sherlock-miscloud</loc>
    <lastmod>2025-04-11T09:00:12.445Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-sherlock-litter</loc>
    <lastmod>2025-04-07T07:00:28.706Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-ctf-2025-forensics-tales-for-the-brave</loc>
    <lastmod>2025-04-01T00:47:35.817Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-ctf-2025-forensics-toolpie</loc>
    <lastmod>2025-03-26T23:19:36.714Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-ca-2025</loc>
    <lastmod>2025-03-26T13:00:25.007Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-sherlock-bumblebee</loc>
    <lastmod>2024-03-29T08:00:28.003Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-sherlock-meerkat</loc>
    <lastmod>2024-03-22T08:00:09.425Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-cyber-apocalypse-forensics-oblique-final</loc>
    <lastmod>2024-03-17T10:10:07.475Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-cyber-apocalypse-forensics-game-invitation</loc>
    <lastmod>2024-03-16T10:10:45.523Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-cyber-apocalypse-forensics-confinement</loc>
    <lastmod>2024-03-15T22:03:03.767Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/solving-securing-ctf-with-open-ai</loc>
    <lastmod>2023-06-26T08:20:41.898Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/hackthebox-academy</loc>
    <lastmod>2023-06-18T14:02:04.332Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/ive-asked-chatgpt-to-write-a-honeypot</loc>
    <lastmod>2023-05-22T07:00:39.067Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/mega-sekurak-hacking-party-ctf-may-2023</loc>
    <lastmod>2023-05-21T22:01:41.874Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/cyberethical-traceback-2022</loc>
    <lastmod>2023-04-16T18:45:07.450Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-cyberapocalypse-artifacts-of-dangerous-sightings</loc>
    <lastmod>2023-03-23T13:00:39.048Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/netcompany-global-tech-talk-improve-your-cybersecurity-skills</loc>
    <lastmod>2023-02-24T16:02:36.000Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/z3-prover-predicting-dotnet-random</loc>
    <lastmod>2022-11-23T14:35:42.126Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/note-taking-obsidian</loc>
    <lastmod>2022-11-08T08:00:42.668Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/how-to-reinstall-linux-on-encrypted-lvm</loc>
    <lastmod>2022-11-02T08:00:45.389Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/hacktheboo-2022-htb-ctf-write-ups</loc>
    <lastmod>2022-10-27T13:00:42.205Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/mega-sekurak-hacking-party-ctf-solutions</loc>
    <lastmod>2022-10-16T18:00:29.684Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/how-to-add-active-zone-in-cloudflare</loc>
    <lastmod>2022-10-13T23:06:18.165Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/how-to-bypass-windows-11-requirements-check</loc>
    <lastmod>2022-10-03T07:00:44.969Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/modify-windows-setup-boot-image-winpe</loc>
    <lastmod>2022-09-26T07:00:45.547Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/dual-boot-windows-11-encrypted-kali</loc>
    <lastmod>2022-09-19T07:00:42.186Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/course-hands-on-javascript-for-ethical-hacking</loc>
    <lastmod>2022-07-23T15:35:43.042Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/restoring-ssh-on-misconfigured-linux</loc>
    <lastmod>2022-05-02T15:54:59.130Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/hackthebox-pwnbox-persistence-script</loc>
    <lastmod>2022-02-16T06:56:09.113Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/kasm-workspaces-fixing-ssl-error</loc>
    <lastmod>2022-01-26T22:57:31.072Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/run-kasm-workspaces-on-raspberry-pi</loc>
    <lastmod>2022-01-22T17:40:32.324Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/traceback-2021</loc>
    <lastmod>2022-01-16T23:31:21.310Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/kringlecon-holiday-hack-challenge-2021</loc>
    <lastmod>2022-01-08T12:23:24.854Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-cyber-santa-ctf-2021-toy-workshop</loc>
    <lastmod>2021-12-13T20:25:42.457Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/thm-linuxprivesc-sudo</loc>
    <lastmod>2021-09-27T20:58:00.000Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/android-malware-analysis-preparation</loc>
    <lastmod>2021-09-20T10:50:24.142Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/thm-ccpentesting</loc>
    <lastmod>2021-09-13T07:53:34.468Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/world-wide-hack-alpha-first-impression</loc>
    <lastmod>2021-09-05T22:05:58.791Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/how-to-install-kali-on-the-virtual-machine</loc>
    <lastmod>2021-08-30T00:17:46.412Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/how-to-install-kali-on-a-raspberry-pi</loc>
    <lastmod>2021-08-23T10:30:36.009Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/thm-uploadvulns</loc>
    <lastmod>2021-08-16T07:55:27.500Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/google-ctf-2021-filestore</loc>
    <lastmod>2021-08-08T23:35:44.942Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-business-ctf-2021-badransomware</loc>
    <lastmod>2021-08-01T22:55:33.771Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-business-ctf-2021-discordvm</loc>
    <lastmod>2021-07-26T19:06:36.793Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/how-to-set-up-git-commit-signing</loc>
    <lastmod>2021-07-26T08:07:40.280Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/kali-linux-on-amazon-ec2</loc>
    <lastmod>2021-07-18T22:56:20.000Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/infosecurity-europe-2021-day-3</loc>
    <lastmod>2021-07-16T21:36:26.835Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/infosecurity-europe-2021-day-2</loc>
    <lastmod>2021-07-15T05:46:19.027Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/infosecurity-europe-2021-day-1</loc>
    <lastmod>2021-07-13T22:19:05.089Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-starting-point-shield</loc>
    <lastmod>2021-07-12T22:00:00.000Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-starting-point-vaccine</loc>
    <lastmod>2021-07-12T04:27:02.524Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/review-pre-security</loc>
    <lastmod>2021-07-06T20:02:46.470Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/securing-ctf-rozdzka</loc>
    <lastmod>2021-07-04T22:13:20.404Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/why-patreon</loc>
    <lastmod>2021-06-30T22:34:41.703Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-starting-point-oopsie</loc>
    <lastmod>2021-06-27T22:41:02.947Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/single-click-toc</loc>
    <lastmod>2021-06-25T04:10:58.622Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/hack4lem-2021</loc>
    <lastmod>2021-06-21T18:08:47.579Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/htb-starting-point-archetype</loc>
    <lastmod>2021-06-20T23:29:28.129Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/road-so-far</loc>
    <lastmod>2021-06-11T21:39:22.692Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/learn-ethical-hacking</loc>
    <lastmod>2021-06-07T04:54:52.031Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/run-dvwa-from-docker</loc>
    <lastmod>2021-05-31T05:01:24.550Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/writeup-get-schwifty-pickle-rick</loc>
    <lastmod>2021-05-28T05:02:40.730Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/my-hacking-lab</loc>
    <lastmod>2021-05-24T03:29:40.770Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/thm-yotjf</loc>
    <lastmod>2021-05-21T05:41:13.959Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/linpeas</loc>
    <lastmod>2021-05-17T05:08:10.908Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/cyber-apocalypse-2021-caas</loc>
    <lastmod>2021-05-14T05:41:11.173Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/cyber-apocalypse-2021-passphrase</loc>
    <lastmod>2021-05-10T05:15:18.479Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/cyber-apocalypse-2021-inspector-gadget</loc>
    <lastmod>2021-05-07T01:03:43.176Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/cyber-apocalypse-2021-key-mission</loc>
    <lastmod>2021-05-02T14:49:45.000Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/cyber-apocalypse-2021-wild-goose-hunt</loc>
    <lastmod>2021-04-29T13:07:17.463Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/page/wits-2023-cybersec</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/page/donate</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/series/ctf-cyber-apocalypse-2021</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/series/tools</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/series/htb-starting-point</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/series/infosecurity-europe-2021</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/series/htb-business-2021</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/series/kasm-raspberry-pi</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/series/htb-cyber-apocalypse-2023</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/series/htb-cyber-apocalypse-2024</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/series/htb-sherlocks</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/series/htb-cyber-apocalypse-2025</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/archive</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.cyberethical.me/recommendations</loc>
    <lastmod>2026-04-16T07:51:26.306Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.4</priority>
  </url>
</urlset>