<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://hackernews.in/article/hacking-microsoft-iis-from-recon-to-advanced-fuzzing</loc>
    <lastmod>2026-04-27</lastmod>
    <image:image>
      <image:loc>https://miro.medium.com/v2/resize:fit:700/1*YpG66o4sP1IYfsZCgVgv7Q.jpeg</image:loc>
      <image:title>Hacking Microsoft IIS: From Recon to Advanced Fuzzing</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/govtrap-government-impersonation-scams-at-industrial-scale</loc>
    <lastmod>2026-04-27</lastmod>
    <image:image>
      <image:loc>https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVJm9FED_QKUoixaE-5e2wlfYKM9JAd2BYm7ex6GfEfY-NFvWVhm2bFgwPu-eNJ6lfaJMc-fqC0luEE5DlvBFMliXE-hwP_s24k8nNfl-gRfeohRRtRDU1bjPhX8gZE146gS0geQGBCuPJwHQ4n9oepxMvvY_EqNFO9VPSn4IVZUEWi7Uw35UCi9ioe8w/s728-rw-e365/ctm360-main.jpg</image:loc>
      <image:title>🕵️ GovTrap: Government Impersonation Scams at Industrial Scale</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/mastering-sqlmap-and-ghauri-a-practical-guide-to-waf-bypass-techniques-e6b8ef</loc>
    <lastmod>2026-04-27</lastmod>
    <image:image>
      <image:loc>https://miro.medium.com/v2/resize:fit:700/1*zmvSjJ1pagNxEbTahKI57g.png</image:loc>
      <image:title>Mastering SQLMap and Ghauri: A Practical Guide to WAF Bypass Techniques</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/deepfakes-are-targeting-identity-systems-not-just-media</loc>
    <lastmod>2026-04-26</lastmod>
    <image:image>
      <image:loc>https://www.bleepstatic.com/content/posts/2026/02/28/Deepsight-hero.jpg</image:loc>
      <image:title>Deepfakes Are Targeting Identity Systems  Not Just Media</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/broken-access-control-complete-guide-for-web-security</loc>
    <lastmod>2026-04-26</lastmod>
    <image:image>
      <image:loc>https://miro.medium.com/v2/resize:fit:828/format:webp/1*2ESn_UP4Y3NxJNfyNBoHEA.png</image:loc>
      <image:title>Broken Access Control  Complete Guide for Web Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/i-handed-chatgpt-100-to-trade-stocks-here-s-what-happened-in-2-months</loc>
    <lastmod>2026-04-25</lastmod>
    <image:image>
      <image:loc>https://miro.medium.com/v2/resize:fit:700/1*6o82nTO9HDRHNNlmCLlxvw.png</image:loc>
      <image:title>I Handed ChatGPT $100 to Trade Stocks — Here&apos;s What Happened in 2 Months.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/integrating-shodan-with-hexstrike-ai-using-gemini-cli-72ec7b</loc>
    <lastmod>2026-04-25</lastmod>
    <image:image>
      <image:loc>https://miro.medium.com/v2/resize:fit:700/1*Oi1g3oXGgNKHuSgX9cWJCA.png</image:loc>
      <image:title>Integrating Shodan with HexStrike-AI Using Gemini-CLI</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/ai-is-expanding-the-cyber-attack-surface-the-rise-of-credential-based-threats</loc>
    <lastmod>2026-04-25</lastmod>
    <image:image>
      <image:loc>https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZYQ0fnhz5kRwJkNzf0uhKuQC63Cs1Hrc-_fx4ooMYgXZkBhyBk3ue0WXZvLJEgBekw42tBkSBQWsFLSOrZ1wkDgAIcjjmYAcckidf94AAHWmXlU6cQi3YBc_AezSH8t3flLG4_IQ5Ilk925oqQW_l_PBprCotrYiDbDOgoBWRirL5HsozrcsXPHT1rpc/s728-rw-e365/git-main.jpg</image:loc>
      <image:title>AI is Expanding the Cyber Attack Surface  The Rise of Credential-Based Threats</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/russian-ctrl-toolkit-delivered-via-malicious-lnk-files-hijacks-rdp-via-frp-tunnels</loc>
    <lastmod>2026-04-24</lastmod>
    <image:image>
      <image:loc>https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh05CEOtp0cIlsi1qDK4HRH2PPOFyvB5jca65pAQVsnCfBHZ-wRGt0s8VhvzO_l-4Q9H_xGKQsO_efVGzJ46ElLQNaq_FEp6wPUou4aqTvEKMPlEEGOTyEtISTj0VkC5QmO38HuxWehNDTUkdvCVCCp-GrIPWJyFt4dTLp1TIbqW8hAiVEJ-vxnoKUexR6-/s1700-e365/ctrl-ctrl.jpg</image:loc>
      <image:title>Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/teampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files</loc>
    <lastmod>2026-04-24</lastmod>
    <image:image>
      <image:loc>https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1CMUCCEUOX5JczcW-qUC2Bw8_3GmKNoLItyUq-AeuCUvFrJJL0t6aW5EhyJzNT5OyQJulbqwy847fK_EEBieTmTHEKn33suBcHss0AflwRWkPdmqT7FUbX5Rahkwz09g0Fw2GDZr00dAqHeEouzWvFVKMLgNshyO2HQ6QcD5qtbNu59djr1cdm0iV_ksj/s1700-e365/wave.jpg</image:loc>
      <image:title>TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/how-i-hacked-a-website-just-by-looking-at-the-source-code-part-2-926195</loc>
    <lastmod>2026-04-24</lastmod>
    <image:image>
      <image:loc>https://miro.medium.com/v2/resize:fit:700/1*L7YrKvd45f24zKknvfefHA.png</image:loc>
      <image:title>How I hacked a website just by looking at the source code Part-2</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/iran-linked-hackers-breach-fbi-director-s-personal-email-hit-stryker-with-wiper-attack</loc>
    <lastmod>2026-04-24</lastmod>
    <image:image>
      <image:loc>https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB5PedpQX_DQaCrJ76V6gQtAUKvDiV1udgR3vPrPp8k7dcP8jACbAPITTEwRpl7dS05Dz_hYFlt2v4H6KTukko0Sg8vRZpDGgWNbGzVqQDwcntdMVmhb3x5v0q3d0gRcbedgOxZLiVeiDCaxb8TNO8dEaE7Bn54TCqxKvbb7Ct_5Wxsxx5WSn2bqEIJqB4/s1700-e365/iran-hacking.jpg</image:loc>
      <image:title>Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/why-linux-users-don-t-fear-viruses-and-what-they-fear-instead</loc>
    <lastmod>2026-04-24</lastmod>
    <image:image>
      <image:loc>https://miro.medium.com/v2/resize:fit:700/0*uZX55Zg4Z-Ry4jqB</image:loc>
      <image:title>Why Linux Users Don&apos;t Fear Viruses, And What They Fear Instead</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://hackernews.in/article/i-found-105-profitable-one-person-business-ideas-using-this-chatgpt-prompt</loc>
    <lastmod>2026-04-23</lastmod>
    <image:image>
      <image:loc>https://miro.medium.com/v2/resize:fit:700/1*lvAEw6R0bE7TWUfbDgrB_A.png</image:loc>
      <image:title>I Found 105 Profitable One-Person Business Ideas Using This ChatGPT Prompt</image:title>
    </image:image>
  </url>
</urlset>
