<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://blog.estfanous.com/</loc></url><url><loc>https://blog.estfanous.com/certificate-attacks-esc1-15</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/certificate-attacks-esc1-15/certifried</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/certificate-attacks-esc1-15/esc1</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/certificate-attacks-esc1-15/esc11</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/certificate-attacks-esc1-15/esc2</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/certificate-attacks-esc1-15/esc3</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/certificate-attacks-esc1-15/esc7</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/certificate-attacks-esc1-15/esc8</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/attacking-login-portals</loc><lastmod>2025-07-09T20:16:23.494Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/attacking-login-portals/attacking-other-portals</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/attacking-login-portals/bypassing-mfa2fa</loc><lastmod>2025-07-09T20:16:28.821Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/attacking-login-portals/password-spraying-o365-attacking-o365</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/attacking-login-portals/password-spraying-owa-outlook-web-app</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/attestation-letters</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/before-we-start</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/before-we-start/checklists-ftw</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/before-we-start/client-communication</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/before-we-start/rules-of-engagement</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/before-we-start/verifying-scope</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/client-debriefs</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/client-retests</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/default-credentials</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/default-web-pages</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/historical-account-compromises</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/ike-aggressive-mode</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/information-disclosure</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/insufficient-authentication-controls</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/insufficient-encryption-the-most-by-far</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/insufficient-patching</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/insufficient-traffic-blocking</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/open-mail-relays</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/undetected-malicious-activity</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/unexpected-perimeter-services</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/username-enumeration</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/common-pentest-findings/weak-password-policy</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/escalating-access</loc><lastmod>2025-10-30T20:38:45.988Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/escalating-access/strategy-walkthrough</loc><lastmod>2025-10-30T20:38:45.988Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/information-gatheringosint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/information-gatheringosint/enumerating-valid-accounts-pre-attack</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/information-gatheringosint/hunting-breached-credentials</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/information-gatheringosint/identifying-emails-employees</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/information-gatheringosint/other-useful-information</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/kicking-off</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/kicking-off/attack-strategy</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/kicking-off/reviewing-extracting-information</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/kicking-off/vulnerability-scanning</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/external-pentest-playbook/report-writing</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/capstone-challenge</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/capstone-challenge/anonymous</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/capstone-challenge/brainpan1-buffer-overflow-with-immunity-debugger</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/capstone-challenge/convertmyvideo</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/capstone-challenge/lazy-admin</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/capstone-challenge/tomghost</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/capabilities</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/docker</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/kernal-exploits</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/kernal-exploits/escalation-via-kernel-exploit</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/nfs-root-squashing</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/other-suid-escalation</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/other-suid-escalation/binary-symlinks</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/other-suid-escalation/environmental-variables</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/other-suid-escalation/shared-object-injection</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/password-file-permissions</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/password-file-permissions/ssh-keys</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/password-file-permissions/stored-passwords</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/password-file-permissions/weak-file-permissions</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/scheduled-tasks</loc><lastmod>2025-07-29T19:25:14.373Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/scheduled-tasks/challenge-machine-cmess</loc><lastmod>2025-07-29T19:25:14.373Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/scheduled-tasks/cron-file-overwrites</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/scheduled-tasks/cron-paths</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/scheduled-tasks/cron-timers</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/scheduled-tasks/cron-wildcards</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/sudo</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/sudo/cve-2019-14287-sudo-bypass</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/sudo/cve-2019-18634-sudo-buffer-overflow</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/sudo/intended-functionality</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/sudo/ldpreload</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/sudo/simple-ctf-challenge-machine</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/sudo/sudo-shell-escaping</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/suid-set-user-id</loc><lastmod>2025-07-29T17:14:24.486Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/escalation-paths/suid-set-user-id/vulnversity</loc><lastmod>2025-07-29T17:14:24.486Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/exploring-automated-tools</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/exploring-automated-tools/linpeas</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/exploring-automated-tools/resources-and-tips</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/initial-enumeration</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/initial-enumeration/network-enumeration</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/initial-enumeration/password-hunting</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/initial-enumeration/system-enumeration</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/initial-enumeration/user-enumeration</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/linux-priv-esc/resources</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/my-exam-checklist</loc><lastmod>2025-10-28T13:29:29.056Z</lastmod></url><url><loc>https://blog.estfanous.com/my-exam-checklist/website</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/operationalizing-cybercrime-data-for-red-teams-offensive-ops</loc><lastmod>2025-06-24T00:09:05.999Z</lastmod></url><url><loc>https://blog.estfanous.com/osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint-case-studies</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint-case-studies/cooking-tutorials</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint-case-studies/deadly-osint-pop-smoke</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint-case-studies/influencer-home-tour</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint-report-writing</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/email-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/hunting-business-information</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/image-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/image-osint/identifying-geographical-locations</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/image-osint/physical-location-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/image-osint/reverse-image-searching</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/image-osint/viewing-exif-data</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/image-osint/where-in-the-world</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/password-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/people-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/people-osint/discovering-birthdates</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/people-osint/hunting-phone-numbers</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/people-osint/searching-for-people</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/people-osint/searching-for-resumes</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/people-osint/voter-records</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/search-engine-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/social-media-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/social-media-osint/facebook-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/social-media-osint/instagram-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/social-media-osint/linkedin-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/social-media-osint/reddit-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/social-media-osint/snapchat-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/social-media-osint/tiktok-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/social-media-osint/twitter-x-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/sock-puppets</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/username-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/website-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/what-is-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/osint/wireless-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/cracking-captured-hashes</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/domain-enum-with-bloodhound</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/domain-enum-with-plumhound</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/domain-enumeration-with-ldapdomaindump</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/dumping-the-ntdsdit</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/gaining-shell-access</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/golden-ticket-w-mimikatz</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/gpp-attacks-cpassword-attacks</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/gpp-attacks-cpassword-attacks/mitigations</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/ipv6-dns-takeover-via-mitm6</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/ipv6-dns-takeover-via-mitm6/mitigations</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/kerberoasting</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/kerberoasting/mitigations</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/llmnr</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/llmnr/mitigation</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/mimikatz-theres-also-kiwi</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/pass-attacks-the-passthe-hash</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/pass-attacks-the-passthe-hash/mitigations</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/pingcastle</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/post-compromise</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/post-compromise-strat</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/shouldnt-use-unless-approved</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/smb-relay-attacks-ntlm</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/smb-relay-attacks-ntlm/mitigations</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/token-impersonation</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/token-impersonation/mitigation</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/url-file-attacks</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/active-directory/we-own-the-domain-now-what</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/attack-prio</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/buffer-overflow</loc><lastmod>2025-10-30T20:49:50.952Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/buffer-overflow/bad-characters</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/buffer-overflow/finding-the-offset</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/buffer-overflow/finding-the-right-module-dll</loc><lastmod>2025-10-30T20:47:56.329Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/buffer-overflow/fuzzing</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/buffer-overflow/generating-shellcode-and-gaining-root</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/buffer-overflow/spiking</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/buffer-overflow/using-python3-and-mona</loc><lastmod>2025-10-30T20:49:51.023Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation</loc><lastmod>2025-10-30T20:47:27.968Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/academy</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/blackpearl</loc><lastmod>2025-10-30T20:47:28.620Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/brute-force-attacks</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/butler</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/dev</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/eternal-blue</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/gaining-root-with-metasploit</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/manual-exploitation</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/shells-netcat</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/staged-vs-non-staged-payloads</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/exploitation/what-to-do-after-gaining-acess</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/passive</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/passive/breached-data</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/passive/email-addresses</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/passive/subdomains</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/passive/web-technologies</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/scanning-and-enum</loc><lastmod>2025-10-30T20:41:53.716Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/scanning-and-enum/active-find-directories</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/scanning-and-enum/connecting-to-smb</loc><lastmod>2025-08-22T14:29:53.603Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/scanning-and-enum/finding-exploits</loc><lastmod>2025-10-30T20:41:34.942Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/scanning-and-enum/kioptrix</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/scanning-and-enum/kioptrix/notes</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/scanning-and-enum/kioptrix/notes/vulnerabilities</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/scanning-and-enum/metasploit</loc><lastmod>2025-10-30T20:40:57.701Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/scanning-and-enum/nessus</loc><lastmod>2025-10-30T20:41:54.074Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/information-gathering/scanning-and-enum/ssh</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/internal-attack-prio</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/kali</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/kali/installing-and-updating-tools</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/kali/network-commands</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/kali/scripting-w-bash</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/kali/starting-and-stopping-srvc</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/kali/users-and-privileges</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/post-exploitation</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/post-exploitation/clean-up</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/post-exploitation/file-transfers-review</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/post-exploitation/maintaining-access-persistence</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/post-exploitation/pivoting</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/python</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/python/advanced-strings</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/python/basic</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/python/classes-and-objects</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/python/dictionaries</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/python/importing</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/python/reading-and-writing-files</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/python/sockets-and-netcat</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/subnet</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/tips-and-tricks</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/tools</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/tools/hashcat</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/tools/hashcat/dumping-and-cracking-hashes</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/tools/printnightmare-cve-2021-1675</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/tools/zerologon</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-enumeration-revisited</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/authentication</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/authentication/brute-force-w-burp-or-ffuf</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/authentication/mfa</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/command-injection</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/cross-site-scripting-xss</loc><lastmod>2025-12-10T18:26:25.478Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/cross-site-scripting-xss/examples-walkthrough</loc><lastmod>2025-12-10T18:26:26.931Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/file-upload</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/idorbola-insecure-direct-object-reference</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/sql-injection</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/sql-injection/blind-injection</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/web-application-exploitation/xxe-external-entities-injection</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/pjpt/wpa2-psk-hacking-process</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/practical-network-penetration-tester-pnpt-by-tcm-security</loc><lastmod>2025-10-28T13:29:29.056Z</lastmod></url><url><loc>https://blog.estfanous.com/practical-network-penetration-tester-pnpt-by-tcm-security/report-writing</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/capstone-challenges</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/capstone-challenges/alfred-tryhackme</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/capstone-challenges/arctic-hackthebox</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/capstone-challenges/bastard-hackthebox</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/capstone-challenges/bastion-hackthebox-mremoteng</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/capstone-challenges/querier</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/devel-iis-75-asp</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/cve-2019-1388-blaster-machine-on-tryhackme</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/dll-hijacking</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/executable-files</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/getsystem</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/impersonation-and-potato-attacks</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/impersonation-and-potato-attacks/alternate-data-streams</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/impersonation-and-potato-attacks/impersonation-privileges</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/impersonation-and-potato-attacks/potato-attacks</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/kernel-exploits</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/kernel-exploits/manual-kernel-exploitation</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/kernel-exploits/metasploit</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/passwords-and-port-forwarding</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/passwords-and-port-forwarding/achat-exploitation</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/passwords-and-port-forwarding/chatterbox</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/registry</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/registry/alwaysinstallelevated</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/registry/autoruns</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/registry/regsvc-acl</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/runas</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/service-permissions-paths</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/startup-applications</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/steel-mountain-tryhackme-box</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/steel-mountain-tryhackme-box/manual-winpeas-and-nc</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/tryhackme-labs</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/unquoted-service-paths</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/escalation-paths/windows-subsystem-for-linux</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/exploits-codes-for-quick-ref</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/exploring-automated-tools</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/exploring-automated-tools/new-suggester</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/exploring-automated-tools/old-suggester</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/exploring-automated-tools/powershell</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/exploring-automated-tools/windows-exploit-suggester</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/exploring-automated-tools/winpeas</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/initial-enumeration-windows</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/initial-enumeration-windows/firewall-and-antivirus-enum</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/initial-enumeration-windows/network-enum</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/initial-enumeration-windows/password-hunting</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/initial-enumeration-windows/system-enum</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/initial-enumeration-windows/user-enum</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/my-challenges</loc><lastmod>2025-09-17T13:56:49.407Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/my-challenges/active</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/my-challenges/forest</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/my-challenges/jab</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/my-challenges/sauna</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/windows-priv-esc/my-challenges/tally</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/working-with-osint-tools</loc><lastmod>2025-07-29T19:17:41.170Z</lastmod></url><url><loc>https://blog.estfanous.com/working-with-osint-tools/exploring-osint-frameworks</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/working-with-osint-tools/hunting-emails-and-breached-data</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/working-with-osint-tools/image-and-location-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/working-with-osint-tools/phone-number-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/working-with-osint-tools/social-media-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/working-with-osint-tools/username-and-account-osint</loc><lastmod>2025-06-23T16:56:48.334Z</lastmod></url><url><loc>https://blog.estfanous.com/working-with-osint-tools/website-osint-tools</loc><lastmod>2025-07-29T19:17:57.707Z</lastmod></url></urlset>