<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
        xmlns:xhtml="http://www.w3.org/1999/xhtml"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
        xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  
  <!-- Homepage -->
  <url>
    <loc>https://cyberhawk-66n.pages.dev/</loc>
    <lastmod>2026-04-12</lastmod>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
  </url>
  
  <!-- Static Pages -->
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/courses</loc>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos</loc>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/threats</loc>
    <changefreq>daily</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/sops</loc>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources</loc>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/about</loc>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  
  <!-- Blog Posts -->
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/eviltokens-phaas-device-code-phishing-campaign</loc>
    <lastmod>2026-04-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-install-security-onion-2-4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-install-fortianalyzer-vm</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-use-the-cyberhawk-ioc-scanner</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/the-complete-guide-to-cyberhawk-live-cti-tools</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-hunt-iocs-like-a-pro-using-cyberhawk-s-ioc-scanner</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-use-kali-linux-with-claude-ai-a-complete-setup-guide-for-penetration-testers</loc>
    <lastmod>2026-03-10</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/complete-guide-install-misp-on-docker-in-linux-production-ready</loc>
    <lastmod>2026-03-10</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-setup-moltbot-in-cloudflare-the-ultimate-edge-ai-tutorial</loc>
    <lastmod>2026-03-10</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/llm-as-a-judge-how-ai-evaluates-ai-in-security-scans</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-use-mythic-c2-safely-lab-setup-threat-intel-and-blue-team-detection</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-use-kali-linux-with-claude-ai-official-setup-guide-for-penetration-testers</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/cyber-resilience-shifting-from-prevention-to-business-continuity-and-operational-resilience</loc>
    <lastmod>2026-03-08</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/greynoise-for-soc-analysts-a-practical-threat-hunting-playbook</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/fortigate-ipsec-site-to-site-vpn-ikev2-full-cli-setup-verification-and-troubleshooting-guide</loc>
    <lastmod>2026-02-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/top-5-threat-intelligence-feeds-every-defender-should-monitor-in-2025</loc>
    <lastmod>2026-02-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-attackers-use-telegram-for-c2-infrastructure-the-new-command-control-playbook</loc>
    <lastmod>2026-02-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-use-abuseipdb-for-cyber-threat-hunting-a-complete-soc-guide</loc>
    <lastmod>2026-02-25</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/mastering-any-run-ti-lookup-building-high-fidelity-threat-hunting-queries-with-iocs-ioas-iobs</loc>
    <lastmod>2026-02-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-use-shodan-for-performing-osint-recon</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/how-to-use-virustotal-for-threat-intelligence</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/kali-linux-lateral-movement-traversing-the-network</loc>
    <lastmod>2026-02-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/7-protocol-analysis-tricks-you-won-t-learn-in-ccna-master-network-traffic-like-a-pro</loc>
    <lastmod>2026-02-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/secure-ssh-like-a-pro-7-steps-every-linux-admin-should-know</loc>
    <lastmod>2026-02-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/top-10-ethical-hacking-tools-and-essential-commands-for-2026</loc>
    <lastmod>2026-02-14</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/john-the-ripper-complete-guide-master-password-cracking-in-2026</loc>
    <lastmod>2026-02-14</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/blog/turnt-tunnel-c2-traffic-through-zoom-and-teams-turn-servers</loc>
    <lastmod>2026-02-14</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
  </url>
  
  <!-- Courses -->

  
  <!-- Videos -->
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/how-to-install-misp-on-docker-in-linux-cyberhawkconsultancy-cyberhawkthreatintel-cyberhawkk</loc>
    <lastmod>2026-02-26</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/how-hackers-are-weaponizing-ms-own-app-against-you-cyberhawkconsultancy-cyberhawkthreatintel</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/hidden-malware-cyberhawkconsultancy-rudravermacyberhawk-cyberhawkthreatintel</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/how-to-install-fortigate-virtual-appliance-on-hyper-v-configuration-guide-cyberhawkconsultancy</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/the-hacker-who-built-an-empire-cyberhawkconsultancy-rudravermacyberhawk-cyberhawkthreatintel</loc>
    <lastmod>2026-02-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/they-hacked-500-victims-in-2-years-then-fell-apart-cyberhawkconsultancy-cyberhawkthreatintel</loc>
    <lastmod>2026-02-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/your-account-got-hacked-now-exactly-what-to-do-next-cyberhawkconsultancy-cyberhawkthreatintel</loc>
    <lastmod>2026-02-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/how-to-analyze-windows-memory-dump-with-volatility-2-full-forensics-tutorial-cyberhawkconsultancy</loc>
    <lastmod>2026-02-14</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/how-to-install-elastic-agent-on-linux-devices-step-by-step-guide-linux-cyberhawkconsultancy</loc>
    <lastmod>2026-02-14</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/how-instagram-brute-force-attacks-work-instagram-cyberhawkthreatintel-cyberhawkconsultancy</loc>
    <lastmod>2026-02-14</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/zero-day-warfare-how-unknown-vulnerabilities-become-cyber-weapons-cyberhawkconsultancy</loc>
    <lastmod>2026-02-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/real-world-hacking-explained-in-hindi-cyberhawkconsultancy-rudravermacyberhawk</loc>
    <lastmod>2026-02-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/zero-day-cyber-warfare-the-ultimate-weapon-in-modern-cyber-attacks-cyberhawkconsultancy-cyberhawkk</loc>
    <lastmod>2026-02-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/videos/what-is-crashfix-attack-malicious-browser-extension-explained-cyberhawkconsultancy-cyberhawkk</loc>
    <lastmod>2026-02-12</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  
  <!-- Threats -->
  <url>
    <loc>https://cyberhawk-66n.pages.dev/threats/npm-supply-chain-attack-september-2025-shai-hulud-worm</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/threats/apos-ransomware-as-a-service-raas-group</loc>
    <lastmod>2026-02-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/threats/malicious-chrome-extension-crashfix-used-for-initial-access-and-malware-delivery</loc>
    <lastmod>2026-02-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/threats/phonelink-themed-jscript-loader-using-github-raw-config-and-org-in-mp3-second-stage</loc>
    <lastmod>2026-02-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  
  <!-- SOPs -->
  <url>
    <loc>https://cyberhawk-66n.pages.dev/sops/incident-response-for-compromised-user-account-containment-in-microsoft-entra-id</loc>
    <lastmod>2026-02-23</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  
  <!-- Resources -->
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/linux-file-permissions-cheatsheet-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/http-response-code-cheatsheet-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/how-e-mail-works-cheatsheet-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/malware-analysis-cheatsheet-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/managing-suspicious-windows-services-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/linux-ir-command-cheatsheet-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/dynamic-analysis-for-ir-cheatsheet-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/docker-pentesting-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/basic-of-detection-engineering-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/attack-defense-use-cases-in-aws</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/active-directory-penetration-testing-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/purple-team-cheatsheet-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/windows-forensics-office-documents-analysis</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/wireshark-guide-how-to-use-it</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/jr-security-analyst-cookbook-pdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/phishing-analyser</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/log-investigator</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/ioc-hunt</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/base64-payload-analyzer</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/unicode-punycode-decoder</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/powershell-deobfuscator</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/cidr-subnet-calculator</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/hash-generator</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/ioc-defanger-refanger</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/ioc-extractor</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/url-decoder-expander-detective</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/ual-analyser-ms-logs</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/velociraptor-artifact-browser</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/lolbas-browser</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/cve-lookup</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/new-local-account-created-or-added-to-administrators-group</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/notepad-malicious-c2url-host-connection</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/notepad-supply-chain-attack-malicious-file-detection</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/notepad-updater-configuration-change</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/oauth-app-consent-grant-possible-illicit-consent-grant-attack</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/outbound-connection-to-moonrise-c2</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/password-spray-single-ip-multiple-failed-users</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/port-scan-single-host-hitting-many-portshosts</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/potential-command-and-control-activity-detected</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/powershell-base64-encoded-command-execution</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/psexec-based-lateral-movement-detection</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/psexec-service-creation-and-execution-detection</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/qrquishing-signal-targeted-infrastructure-ioc-only</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/hta-execution-via-mshtaexe</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/iconics-configuration-file-tampering</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/impossible-travel-sign-ins-from-geographically-impossible-locations</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/malicious-chrome-extension-c2-communication</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/malicious-chrome-extension-installation-chatgptdeepseek-stealer</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/mass-azure-resource-deletion-wiper-destructive-attack</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/mfa-disabled-or-strong-authentication-removed</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/mfa-push-fatigue-repeated-mfa-challenges-to-same-user</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/modification-of-break-glass-account-properties</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/moonrise-rat-hash-detection</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/moonrise-rat-process-execution</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/multi-indicator-correlation-for-suspicious-activity</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/clawdbot-vs-code-extension-installation-and-activation</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/cloudflare-workers-c2-detection-high-fidelity</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/codeexe-running-from-non-standard-locations</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/correlated-phishing-page-visit-and-llm-api-call</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/device-connected-to-known-malicious-ip-ti-feed-match</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/direct-browser-connections-to-llm-apis</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/direct-send-email-spoofing-detection</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/dns-tunneling-high-volume-and-long-subdomains</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/exfiltration-to-suspicious-cloud-storage-or-text-sharing-sites</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/external-user-activity-in-microsoft-teams</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/fortigate-firewall-policy-change-outside-business-hours</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/guest-user-from-novel-domain-added-to-aad-security-group</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/high-privilege-role-assigned-in-azure-ad</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/high-volume-azure-key-vault-secretkey-access</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/access-to-typosquatted-or-malicious-domains</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/ai-agent-script-execution-with-suspicious-keywords</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/azure-ad-guest-user-invitation-from-novel-domains</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/azure-storage-account-publicanonymous-access-enabled</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/beyondtrust-bomgar-post-exploitation-activity-cve-2026-1731</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/break-glass-account-sign-in</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/brute-force-login-via-windows-security-events</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/c2-beaconing-periodic-outbound-connections-to-single-external-ip</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/clawdbot-malicious-hash-detection</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/google-dorks-generator</loc>
    <lastmod>2026-03-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/image-metadata-exif-analyzer</loc>
    <lastmod>2026-03-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/typosquat-generator</loc>
    <lastmod>2026-03-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/jwt-decoder</loc>
    <lastmod>2026-03-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/email-header-analyzer</loc>
    <lastmod>2026-03-17</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/clawdbot-detection-analyst-friendly-production-version</loc>
    <lastmod>2026-03-16</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/kql-azure-storage-account-public-anonymous-access-enabled</loc>
    <lastmod>2026-03-16</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://cyberhawk-66n.pages.dev/resources/my-kql-queries</loc>
    <lastmod>2026-02-24</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.7</priority>
  </url>
  
</urlset>