<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://noted.kairostay.com/posts/Windows-Malware-Basic-Static-Analysis/</loc>
<lastmod>2024-04-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Natas-Wargames-Walkthrough/</loc>
<lastmod>2024-04-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Practical-Basic-Static-Analysis/</loc>
<lastmod>2024-04-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Practical-Basic-Dynamic-Analysis/</loc>
<lastmod>2024-04-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Lab-Footprinting-And-Recon/</loc>
<lastmod>2024-04-30T14:35:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Assembly-Language-Pt-1/</loc>
<lastmod>2024-05-29T00:19:20+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Introduction-To-Ethical-Hacking/</loc>
<lastmod>2024-05-20T11:31:52+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Footprinting-And-Reconnaissance/</loc>
<lastmod>2024-05-20T11:31:52+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Scanning/</loc>
<lastmod>2024-05-20T11:31:52+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Enumeration/</loc>
<lastmod>2024-05-20T05:22:19+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Vulnerability-Analysis/</loc>
<lastmod>2024-05-18T05:05:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/System-Hacking/</loc>
<lastmod>2024-05-18T05:06:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/MATT-Practical-Revision/</loc>
<lastmod>2024-05-18T13:34:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Fundamentals-Of-Network-Security/</loc>
<lastmod>2024-05-21T14:23:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Network-Segmentation-And-Security-Zones/</loc>
<lastmod>2024-05-22T06:15:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Security-Policy-And-NAT-Policy/</loc>
<lastmod>2024-05-27T15:59:04+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Practical-Firewall-Layer-3-Configuration/</loc>
<lastmod>2024-05-22T08:27:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Application-Identification/</loc>
<lastmod>2024-05-25T09:52:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Firewall-VM-Initial-Setup/</loc>
<lastmod>2024-05-26T06:04:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Content-Identification/</loc>
<lastmod>2024-05-26T09:43:36+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Assembly-Language-Pt-2/</loc>
<lastmod>2024-05-27T15:57:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Malicious-Web-Pages-Analysis/</loc>
<lastmod>2024-07-14T08:53:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/posts/Malicious-Documents-Analysis/</loc>
<lastmod>2024-07-14T15:28:00+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/categories/</loc>
<lastmod>2024-07-22T05:05:16+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/about/</loc>
<lastmod>2024-07-22T05:05:16+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/contributing/</loc>
<lastmod>2024-07-22T05:05:16+00:00</lastmod>
</url>
<url>
<loc>https://noted.kairostay.com/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/malware-analysis-tools-and-techniques/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/matt-notes/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/web-application-penetration-testing/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/wapt-practical/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/matt-practical/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/ethical-hacking/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/eh-commands/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/eh-notes/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/matt-revision-notes/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/network-security/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/ns-notes/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/categories/ns-practical/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/page2/</loc>
</url>
<url>
<loc>https://noted.kairostay.com/page3/</loc>
</url>
</urlset>
