<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://attackersmindset.com/2026/03/10/unraveling-ocean-strike-a-crypto-mining-threat/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2026/03/image-9.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2026/03/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2026/03/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2026/03/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2026/03/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2026/03/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2026/03/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2026/03/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2026/03/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2026/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-03-10T23:17:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2025/09/24/analyzing-publicly-exposed-cobalt-strike-beacon-configurations/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/09/image-7.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/09/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/09/image-5.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/09/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/09/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/09/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/09/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-24T23:37:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2025/05/05/large-scale-hunting-and-collection-from-immature-networks/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/05/2-1.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/05/omni.png</image:loc><image:title>omni</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/05/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2025/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-05-05T18:46:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2025/04/22/ransomware-simulation-tactics/</loc><lastmod>2025-04-22T01:38:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2023/09/30/retrievir-forensic-artifact-retrieval-in-powershell/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2023/09/usage_1.png</image:loc><image:title>usage_1</image:title></image:image><lastmod>2023-10-12T19:40:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2023/02/20/detecting-suspicious-powershell-scripts-with-text-classification-and-deep-neural-networks/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2023/02/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2023/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-05-02T01:06:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/about/</loc><lastmod>2023-05-02T01:04:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://attackersmindset.com/2023/01/24/wiring-up-a-honeypot-network-beesting/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2023/01/logo-no-background.png</image:loc><image:title>logo-no-background</image:title></image:image><lastmod>2023-01-24T19:07:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2022/06/27/responding-to-active-threats-in-low-maturity-environments/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/06/main.png</image:loc><image:title>main</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/06/blank-diagram-1.png</image:loc><image:title>blank-diagram-1</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/06/blank-diagram.png</image:loc><image:title>blank-diagram</image:title></image:image><lastmod>2023-01-24T01:54:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2022/05/05/working-to-bypass-crowdstrike-prevention-of-initial-foothold/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/05/untitled.png</image:loc><image:title>untitled</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/05/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/05/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/05/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/05/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/05/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/05/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/05/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/05/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2022/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2022-05-05T19:29:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2021/10/20/detections-that-work-1/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2021/10/20_0112_st_cybersecurity1.jpg</image:loc><image:title>20_0112_st_cybersecurity1</image:title></image:image><lastmod>2021-11-01T17:08:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2018/05/22/forensics-2-windows-forensics-using-redline/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/511.png</image:loc><image:title>51</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/50.png</image:loc><image:title>50</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/49.png</image:loc><image:title>49</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/48.png</image:loc><image:title>48</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/47.png</image:loc><image:title>47</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/46.png</image:loc><image:title>46</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/45.png</image:loc><image:title>45</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/44.png</image:loc><image:title>44</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/431.png</image:loc><image:title>43</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/421.png</image:loc><image:title>42</image:title></image:image><lastmod>2018-05-22T12:32:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2018/05/19/malware-analysis-1-basic-static-analysis/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/feat4.png</image:loc><image:title>feat</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/111.png</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/10-dwalk1.png</image:loc><image:title>10-dwalk1</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/9-strings.png</image:loc><image:title>9-strings</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/81.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/7-peview1.png</image:loc><image:title>7-peview1</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/63.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/5-2.png</image:loc><image:title>5-2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/5-upx.png</image:loc><image:title>5 upx</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/4-2.png</image:loc><image:title>4-2</image:title></image:image><lastmod>2018-05-19T22:13:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2018/05/19/other-projects-1-writing-a-basic-http-server/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/feat21.png</image:loc><image:title>feat2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/24-connect.png</image:loc><image:title>24-connect</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/23-delete.png</image:loc><image:title>23-delete</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/22-put-functions.png</image:loc><image:title>22-put functions</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/21-makepost.png</image:loc><image:title>21-makepost</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/20-makeget1.png</image:loc><image:title>20-makeget</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/20-makeget.png</image:loc><image:title>20-makeget</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/19-phpstrings.png</image:loc><image:title>19-phpstrings</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/18-request-php.png</image:loc><image:title>18-request php</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/17-fileserver.png</image:loc><image:title>17-fileserver</image:title></image:image><lastmod>2018-05-19T17:26:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2018/05/18/network-scanning-3-basic-vulnerability-identification/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/xss-example.png</image:loc><image:title>xss-example</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/sql-example2.png</image:loc><image:title>sql-example2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/lfi-example.png</image:loc><image:title>lfi-example</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/slash.png</image:loc><image:title>slash</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/dots.png</image:loc><image:title>dots</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/5-xss3.png</image:loc><image:title>5-xss3</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/4-xss2.png</image:loc><image:title>4-xss2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/6-payloads.png</image:loc><image:title>6-payloads</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/3-xss1.png</image:loc><image:title>3-xss1</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/2-xss-and-crawl.png</image:loc><image:title>2-xss and crawl</image:title></image:image><lastmod>2018-05-19T14:14:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2018/05/18/forensics-1-file-signature-analysis/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/ec-6.png</image:loc><image:title>ec-6</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/ec-5.png</image:loc><image:title>ec-5</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/ec-4-1.png</image:loc><image:title>ec-4-1</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/ec-4.png</image:loc><image:title>ec-4</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/ec-3.png</image:loc><image:title>ec -3</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/ec-1.png</image:loc><image:title>ec - 1</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/62.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/52.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/42.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/32.png</image:loc><image:title>3</image:title></image:image><lastmod>2018-05-19T13:42:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2018/05/19/reverse-engineering-1-basic-ida-usage/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/15-xref-string.png</image:loc><image:title>15-xref string</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/14-data.png</image:loc><image:title>14-data</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/13-strings.png</image:loc><image:title>13- strings</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/feat1.png</image:loc><image:title>feat</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/12-first.png</image:loc><image:title>12-first</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/11-xrefs-to.png</image:loc><image:title>11-xrefs to</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/10-wininet.png</image:loc><image:title>10-wininet</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/9-functions-example.png</image:loc><image:title>9-functions example</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/8-main2.png</image:loc><image:title>8-main2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/7-main.png</image:loc><image:title>7-main</image:title></image:image><lastmod>2018-05-19T02:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2018/05/18/anti-forensics-1/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/mac-5-4.png</image:loc><image:title>mac-5-4</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/mac-5-3.png</image:loc><image:title>mac-5-3</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/mac-5-2.png</image:loc><image:title>mac-5-2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/9.png</image:loc><image:title>9</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/8.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/7-2.png</image:loc><image:title>7-2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/7.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/6.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/4.png</image:loc><image:title>4</image:title></image:image><lastmod>2018-05-18T23:07:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/2018/05/18/network-scanning-1-port-scanning-anonymous-ftp-querying-udp-flooding/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/71.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/61.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/51.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/41.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/31.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/1.png</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/feature.png</image:loc><image:title>feature</image:title></image:image><lastmod>2018-05-18T19:40:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://attackersmindset.com/contact/</loc><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/contact.png</image:loc><image:title>contact</image:title></image:image><image:image><image:loc>https://attackersmindset.com/wp-content/uploads/2018/05/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2018-05-18T19:31:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://attackersmindset.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-10T23:17:37+00:00</lastmod></url></urlset>
