<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/01_Skills/Bind-Shell-and-Reverse-Shell</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/01_Skills/Email-Operations</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/01_Skills/File-Transfer</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/01_Skills/Information-Gathering-Tools</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/01_Skills/Linux-System-Utilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/01_Skills/Network-Tools-and-Proxies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/01_Skills/Shell-Operations</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/01_Skills/System-Configuration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/01_Skills/Troubleshooting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/01_Skills/Windows-System-Utilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/02_Techniques/Chisel</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/02_Techniques/Lateral-Movement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/02_Techniques/Ligolo-ng</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/02_Techniques/Metasploit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/02_Techniques/Network-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/02_Techniques/OSINT</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/02_Techniques/Password-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/02_Techniques/Pivot-and-Port-Redirection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/02_Techniques/Web-App-Attack</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/02_Techniques/dnscat2</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/03_RedTeam/ADCS-Exploits</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/03_RedTeam/Active-Directory-Exploits</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/03_RedTeam/Active-Directory</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/03_RedTeam/Oracle--and--WebLogic-Exploits</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/03_RedTeam/SCCM-Exploits</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/03_RedTeam/Sharepoint-Exploits</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/04_Defense-Evasion/Antivirus-Evasion</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/04_Defense-Evasion/Application-Whitelisting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/04_Defense-Evasion/Bypassing-Network-Filters</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/04_Defense-Evasion/Kiosk-Breakouts</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/04_Defense-Evasion/Process-Injection-and-Migration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/05_Post-Exploitation/Data-Exfiltration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/05_Post-Exploitation/UAC-Bypass</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/05_Post-Exploitation/Windows-Persistence</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/06_Initial-Compromise/Initial-Compromise</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/10_Linux/Enumeration-(Linux)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/10_Linux/Privilege-Escalation-(Linux)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/11_Windows/Enumeration-(Windows)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/01_Knowledge-Base/11_Windows/Privilege-Escalation-(Windows)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/02_Resources/01_Script/C-Sharp</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/02_Resources/01_Script/C-and-C++</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/02_Resources/01_Script/Javascript</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/02_Resources/01_Script/Macro</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/02_Resources/01_Script/PHP</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/02_Resources/01_Script/Powershell</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/02_Resources/01_Script/Python</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/02_Resources/01_Script/SQL</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/1---Intro/1.-Intro</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/1---Intro/2.-Opsec</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/1---Intro/3.-Phases</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/1---Intro/4.-Planning</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/1.-Credentials--and--User-Impersonation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/10.-Pass-The-Hash</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/11.-Overpass-the-Hash</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/12.-Extracting-Kerberos-Tickets</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/2.-LogonPasswords</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/3.-eKeys</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/4.-Security-Account-Manager</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/5.-Domain-Cached-Credentials</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/6.-Make-Token</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/7.-Process-Injection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/8.-Token-Impersonation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/10---Credentials--and--User-Impersonation/9.-SpawnAs</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/11---Password-Cracking-Tips--and--Tricks/1---Password-Cracking-Tips--and--Tricks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/11---Password-Cracking-Tips--and--Tricks/2---Wordlists</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/11---Password-Cracking-Tips--and--Tricks/3---Wordlists-+--Rules</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/11---Password-Cracking-Tips--and--Tricks/4---Masks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/11---Password-Cracking-Tips--and--Tricks/5---Mask-Length--and--Mask-Files</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/11---Password-Cracking-Tips--and--Tricks/6---Combinator</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/11---Password-Cracking-Tips--and--Tricks/7---Hybrid</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/11---Password-Cracking-Tips--and--Tricks/8---kwprocessor</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/12---Session-Passing/1---Session-Pasing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/13---Pivoting/1---SOCKS-Proxies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/13---Pivoting/2---Windows-Apps</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/13---Pivoting/3---Browsers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/13---Pivoting/4---Metasploit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/13---Pivoting/5---Reverse-Port-Forward</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/13---Pivoting/6---NTML-Relaying</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/14---Data-Protection-API/1---DPAPI</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/14---Data-Protection-API/2---Credential-Manager</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/14---Data-Protection-API/3---Google-Chrome</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/15---Kerberos/1---Kerberos</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/15---Kerberos/2---Kerberoasting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/15---Kerberos/3---AS-REP-Roasting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/15---Kerberos/4---Unconstrained-Delegation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/15---Kerberos/5---The--percent22Printer-percent22-Bug</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/15---Kerberos/6---Constrained-Delegation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/15---Kerberos/7---Alternate-Service-Name</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/15---Kerberos/8---S4U2self-Abuse</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/15---Kerberos/9---Linux-Credential-Cache</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/16---Active-Directory-Certificate-Services/1---Active-Directory-Certificate-Services</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/16---Active-Directory-Certificate-Services/2---Finding-Certificate-Authorities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/16---Active-Directory-Certificate-Services/3---Misconfigured-Certificated-Templates</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/16---Active-Directory-Certificate-Services/4---NTLM-Relaying-to-ADCS-HTTP-Endpoints</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/16---Active-Directory-Certificate-Services/5---User--and--Computer-Persistence</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/16---Active-Directory-Certificate-Services/6---AD-CS-Auditing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/17---Group-Policy/1---Group-Policy</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/17---Group-Policy/2---Pivot-Listeners</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/17---Group-Policy/3---Remote-Server-Administration-Tools-(RSAT)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/17---Group-Policy/SharpGPOAbuse</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/18---Discretionary-Access-Control-Lists/1--Discretionary-Access-Control-Lists</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/18---Discretionary-Access-Control-Lists/2---Reset-User-Password</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/18---Discretionary-Access-Control-Lists/3---Targeted-Kerberoasting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/18---Discretionary-Access-Control-Lists/4---Targeted-AS-REP-Roasting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/18---Discretionary-Access-Control-Lists/5---Modify-Domain-Group-Membership</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/2----C2/1.-CnC</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/2----C2/2.-TeamServer</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/2----C2/3.-Listeners</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/2----C2/4.-Payloads</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/2----C2/5.-Interacting-with-Beacon</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/20---MS-SQL-Servers/1---MS-SQL-Servers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/20---MS-SQL-Servers/2---MS-SQL-NetNTLM-Capture</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/20---MS-SQL-Servers/3---MS-SQL-Command-Execution</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/20---MS-SQL-Servers/4---MS-SQL-Lateral-Movement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/20---MS-SQL-Servers/5---MS-SQL-Privilege-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/21---Domain-Dominance/1---Domain-Dominance</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/21---Domain-Dominance/2---DCSync-Backdoor</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/21---Domain-Dominance/3---AdminSDHolder-Backdoor</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/21---Domain-Dominance/4---Remote-Registry-Backdoor</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/21---Domain-Dominance/5---Skeleton-Key</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/21---Domain-Dominance/6---Silver-Tickets</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/21---Domain-Dominance/7---Golden-Tickets</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/21---Domain-Dominance/8---Diamond-Tickets</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/21---Domain-Dominance/9----Forged-Certificates</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/22---Forest--and--Domain-Trusts/1---Forest--and--Domain-Trusts</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/22---Forest--and--Domain-Trusts/2---Parent-Child</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/22---Forest--and--Domain-Trusts/3---One-Way-(Inbound)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/22---Forest--and--Domain-Trusts/4---One-Way-(Outbound)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/23---Local-Administrator-Password-Solution/1---Local-Administrator-Password-Solution</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/23---Local-Administrator-Password-Solution/2---LAPS-Persitence</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/23---Local-Administrator-Password-Solution/3---LAPS-Backdoor</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/24---Bypassing-Defences/1---Bypassing-AVs</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/24---Bypassing-Defences/2---Artifact-Kit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/24---Bypassing-Defences/3---ResourceKit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/24---Bypassing-Defences/4---AmsiScanBuffer</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/24---Bypassing-Defences/5---Exclusions</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/24---Bypassing-Defences/6---AppLocker</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/24---Bypassing-Defences/7---AppLocker-Rule-Bypasses</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/24---Bypassing-Defences/8---PowerShell-Constrained-Language-Mode</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/25---Data-Hunting--and--Exfiltration/1---Data-Hunting--and--Exfiltration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/25---Data-Hunting--and--Exfiltration/2---File-Shares</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/25---Data-Hunting--and--Exfiltration/2---Internal-Web-apps</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/25---Data-Hunting--and--Exfiltration/3---Databases</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/26---Post-Engagements--and--Reporting/1---Post-Engagement--and--Reporting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/26---Post-Engagements--and--Reporting/2----Attack-Narrative</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/26---Post-Engagements--and--Reporting/3---Reccomendations</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/26---Post-Engagements--and--Reporting/4---Indicators-Of-Compromise</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/27---Extending-Cobalt-Strike/1---Extending-Cobalt-Strike</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/27---Extending-Cobalt-Strike/2---ElevateKit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/27---Extending-Cobalt-Strike/3---Jump--and--Remote-Exec</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/27---Extending-Cobalt-Strike/4---Beacon-Object-Files</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/27---Extending-Cobalt-Strike/5---Mallebale-Command--and--Control</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/3---External-Reconnaissance/1.-External-Reconnaissance</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/3---External-Reconnaissance/2.-DNS-Records</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/3---External-Reconnaissance/3.-Social-Media</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/4---Initial-Compromise/1.-Initial-Compromise</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/4---Initial-Compromise/2.-Password-Spraying</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/4---Initial-Compromise/3.-Internal-Phishing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/4---Initial-Compromise/4.-HTML-Application-(HTA)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/4---Initial-Compromise/5.-VisualBasic-for-Application-(VBA)-Macro's</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/4---Initial-Compromise/6.-Parent-Child-Relationships</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/4---Initial-Compromise/7.-Building-Alerts-in-Kibana</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/5---Host-Reconnaissance/1.-Host-Reconnaissance</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/5---Host-Reconnaissance/2.-Seatbelt</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/5---Host-Reconnaissance/3.-Screenshots</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/5---Host-Reconnaissance/4.-Keylogger</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/6----Host-Persistence/1.-Host-Persistence</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/6----Host-Persistence/2.-Task-Scheduler</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/6----Host-Persistence/3.-Startup-Folder</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/6----Host-Persistence/4.-Registry-AutoRun</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/6----Host-Persistence/5.-COM-Hijiacking</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/6----Host-Persistence/6.-Hunting-for-COM-Hijacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/7----Host-Privilege-Escalation/1.-Host-Privilege-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/7----Host-Privilege-Escalation/2.-Web-Proxies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/7----Host-Privilege-Escalation/3.-Peer-To-Peer-Listeners</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/7----Host-Privilege-Escalation/4.-Windows-Services</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/7----Host-Privilege-Escalation/5.-Unquoted-Service-Paths</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/7----Host-Privilege-Escalation/6.-Weak-Service-Permissions</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/7----Host-Privilege-Escalation/7.-Weak-Service-Binary-Permissions</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/7----Host-Privilege-Escalation/8.-Always-Install-Elevated</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/7----Host-Privilege-Escalation/9.-UAC-Bypasses</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/1.-Domain-Reconnaissance</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/10.-Get-DomainOU</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/11.-Get-DomainGroup</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/12.-Get-DomainGroupMember</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/13.-Get-DomainGPO</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/14.-Get-DomainGPOLocalGroup</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/15.-Get-DomainGPOUserLocalGroupMapping</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/16.-Find-DomainUserLocation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/17.-Get-NetSession</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/18.-Get-DomainTrust</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/19.-SharpView</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/2.-PowerView</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/20.-ADSearch</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/21.-BloodHound</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/3.-Get-Domain</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/4.-Get-DomainController</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/5.-Get-ForestDomain</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/6.-Get-DomanPolicyData</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/7.-Get-DomainUser</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/8---Domain-Reconnaissance/9.-Get-DomainComputer</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/9---Lateral-Movement/1.-Lateral-Movement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/9---Lateral-Movement/2.-Powershell-Remoting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/9---Lateral-Movement/3.-PsExec</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/9---Lateral-Movement/4.-Windows-Management-Instrumentation-(WMI)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/9---Lateral-Movement/5.-The-Curious-Case-of-CoInitializeSecurity</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---1/9---Lateral-Movement/6.-DCOM</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/1---Intro</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/10---D-Invoke</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/11---MessageBox-with-DInvoke</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/12---CreateProcess-with-DInvoke</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/13---Type-Marshalling</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/2---MessageBox-in-C++</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/3---CreateProcess-in-C++</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/4---PInvoke</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/5---MessageBox-in-CSharp</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/6----CreateProcess-in-Csharp</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/7---Ordinals</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/8----MessageBox-in-VBA</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/1---WinApi/9---CreateProcess-in-VBA</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/2---Process-Injection/1---Intro</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/2---Process-Injection/2---CreateThread</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/2---Process-Injection/3---CreateRemoteThread</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/2---Process-Injection/4---QueueUserAPC</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/2---Process-Injection/5---NtMapViewOfSection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/1---Post-Exploitation-Behaviours</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/10---RWX--and--Cleanup</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/11---Sleep-Mask-Kit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/12---Thread-Stack-Spoofing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/2---SpawnTo</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/3---PPID-Spoofing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/4---Command-Line-Spoofing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/5---Network-Connection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/6---Session-Prepping</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/7---Image-Load-Events</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/8---Named-Pipes-Names</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/3---Defense-Evasion/9---Event-Tracing-for-Windows-(ETW)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/4---Attack-Surface-Reduction/1---Intro</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/4---Attack-Surface-Reduction/2---Block-Child-Process</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/4---Attack-Surface-Reduction/3---Block-Win32-APIs</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/4---Attack-Surface-Reduction/4---Block-Code-Injection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/4---Attack-Surface-Reduction/5---Block-PsExec-or-WMI</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/4---Attack-Surface-Reduction/6---Block-Credential-Stealing-from-LSASS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/5---Windows-Defender-Application-Control/1---Intro</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/5---Windows-Defender-Application-Control/2---Living-Off-The-Land-Binaries,-Scripts-and-Libraries</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/5---Windows-Defender-Application-Control/3---Wildcard-FilePaths</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/5---Windows-Defender-Application-Control/4---User-Modifiable-Binaries</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/5---Windows-Defender-Application-Control/5---Trusted-Applications</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/5---Windows-Defender-Application-Control/6---Trusted-Signers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/5---Windows-Defender-Application-Control/7---Exploiting-Vulnerable-Applications</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/1---Endpoint-Detection-and-Response</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/10---GetSyscallStub</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/11---SysWhispers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/12---Syscalls--and--ArtifactKit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/13---User-Defined-Reflective-Loader</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/14---Kernel-Callbacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/15---Driver-Signature-Enforcement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/2---Detecting-the-Bad</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/3---IAT-Hooking</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/4---Inline-Hooking</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/5---Hook-Bypass-Strategies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/6---Hooking-in-Action</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/7---Manual-Mapping</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/8---Process-Mitigation-Policy</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/01_Zero-Point-Security/CRTO/RedTeaming---2/6---EDR-Evasion/9---Syscalls</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/AWS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Beyond/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Beyond/internet/MAILSERV1-.242</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Beyond/internet/WEBSERV1-.244</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Beyond/intranet/CLIENTWK1-.243</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Beyond/intranet/DCSRV1-.240</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Beyond/intranet/INTERNALSRV1-.241</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Flags</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Internet/VPN-.122</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Internet/Web01-.120</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Internet/Web02-.121</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Intranet/CLIENT01-.82</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Intranet/CLIENT02-.83</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Intranet/DC01-.10</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Intranet/DEV04-.12</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Intranet/FILE02-.11</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Intranet/PROD01-.13</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Intranet/SSH-.14</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Medtech/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-A/AD/DC01-.140</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-A/AD/MS01-.141</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-A/AD/MS02-.142</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-A/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-A/Standalone/Aero-.143</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-A/Standalone/Crystal-.144</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-A/Standalone/Hermes-.145</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-B/AD/DC01-.146</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-B/AD/MS01-.147</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-B/AD/MS02-.148</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-B/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-B/Standalone/Berlin-.150</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-B/Standalone/Gust-.151</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-B/Standalone/Kiero-.149</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-C/AD/DC01-.152</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-C/AD/MS01-.153</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-C/AD/MS02-.154</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-C/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-C/Standalone/Charlie-.157</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-C/Standalone/Frankfurt-.156</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/OSCP-C/Standalone/Pascha-.155</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/internet/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/internet/demo-.246</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/internet/external-.248</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/internet/legacy-.249</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/internet/login-.191</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/internet/mail-.189</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/internet/web01-.245</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/internet/web02-.247</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/intranet/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/intranet/dc02-.6</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/intranet/ftp-.21</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/intranet/intranet-.7</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/intranet/ssh-.19</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/intranet/ssh-.20</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/intranet/webby-.30</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/intranet/wk01-.14</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Relia/intranet/wk02-.15</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Secura/DC01</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Secura/ERA</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Secura/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Secura/SECURE</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Internet/AMSTERDAM05-.224</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Internet/AUSTIN02-.221</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Internet/HOUSTON01-.220</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Internet/MAIL04-.223</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Internet/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Internet/PARIS03-.222</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Internet/SINGAPORE06-.225</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Internet/SYDNEY08-.227</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Internet/TOKYO07-.226</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.10/ARCHIVE-.12</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.10/DC-.250</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.10/LAB-.11</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.10/MAIL-.13</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.10/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.10/RD-.10</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.20/CICD-.14</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.20/CLIENT01-.110</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.20/CLIENT02-.111</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.20/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-10.20/PREPROD-.15</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-172.16/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-172.16/PBX-.32</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-172.16/terminal-.30</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Challenge-Lab/Skylark/Intranet-172.16/vaxbsd-.31</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Proof</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/Report</loc>
    <lastmod>2024-09-22T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/01_OSCP/SecondAttempt/OSCP--AD-206</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/01_General-Course-Information/1.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/01_General-Course-Information/1.1-About-The-PEN-300-Course</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/01_General-Course-Information/1.2-Provided-Material</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/01_General-Course-Information/1.3-Overall-Strategies-for-Approaching-the-Course</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/01_General-Course-Information/1.4-About-the-PEN-300-VPN-Labs</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/01_General-Course-Information/1.5-About-the-OSEP-Exam</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/01_General-Course-Information/1.6-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/02_Operating-System-and-Programming-Theory/2.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/02_Operating-System-and-Programming-Theory/2.1-Programming-Theory</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/02_Operating-System-and-Programming-Theory/2.2-Windows-Concepts</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/02_Operating-System-and-Programming-Theory/2.3-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03-2_Phishing-with-Calendars/3-2.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03-2_Phishing-with-Calendars/3-2.1-Calendar-as-an-Initial-Access-Vector</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03-2_Phishing-with-Calendars/3-2.3-Abusing-Calendars</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03-2_Phishing-with-Calendars/3-2.4-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03_Client-Side-Code-Execution-With-Office/3.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03_Client-Side-Code-Execution-With-Office/3.1-Will-You-Be-My-Dropper</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03_Client-Side-Code-Execution-With-Office/3.2-Phishing-with-Microsoft-Office</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03_Client-Side-Code-Execution-With-Office/3.3-Keeping-Up-Appearances</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03_Client-Side-Code-Execution-With-Office/3.4-Executing-Shellcode-in-Word-Memory</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03_Client-Side-Code-Execution-With-Office/3.5-PowerShell-Shellcode-Runner</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03_Client-Side-Code-Execution-With-Office/3.6-Keep-That-PowerShell-in-Memory</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03_Client-Side-Code-Execution-With-Office/3.7-Talking-To-The-Proxy</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/03_Client-Side-Code-Execution-With-Office/3.8-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/04_Client-Side-Code-Execution-With-Windows-Script-Host/4.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/04_Client-Side-Code-Execution-With-Windows-Script-Host/4.1-Creating-a-Basic-Dropper-in-Jscript</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/04_Client-Side-Code-Execution-With-Windows-Script-Host/4.2-Jscript-and-C-Sharp</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/04_Client-Side-Code-Execution-With-Windows-Script-Host/4.3-In-memory-PowerShell-Revisited</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/04_Client-Side-Code-Execution-With-Windows-Script-Host/4.4-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/05_Process-Injection-and-Migration/5.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/05_Process-Injection-and-Migration/5.1-Finding-a-Home-for-Our-Shellcode</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/05_Process-Injection-and-Migration/5.2-DLL-Injection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/05_Process-Injection-and-Migration/5.3-Reflective-DLL-Injection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/05_Process-Injection-and-Migration/5.4-Process-Hollowing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/05_Process-Injection-and-Migration/5.5-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/06_Introduction-to-Antivirus-Evasion/6.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/06_Introduction-to-Antivirus-Evasion/6.1-Antivirus-Software-Overview</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/06_Introduction-to-Antivirus-Evasion/6.2-Simulating-the-Target-Environment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/06_Introduction-to-Antivirus-Evasion/6.3-Locating-Signatures-in-Files</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/06_Introduction-to-Antivirus-Evasion/6.4-Bypassing-Antivirus-with-Metasploit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/06_Introduction-to-Antivirus-Evasion/6.5-Bypassing-Antivirus-with-C-Sharp</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/06_Introduction-to-Antivirus-Evasion/6.6-Messing-with-Our-Behavior</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/06_Introduction-to-Antivirus-Evasion/6.7-Office-Please-Bypass-Antivirus</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/06_Introduction-to-Antivirus-Evasion/6.8-Hiding-PowerShell-Inside-VBA</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/06_Introduction-to-Antivirus-Evasion/6.9-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/07_Advanced-Antivirus-Evasion/7.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/07_Advanced-Antivirus-Evasion/7.1-Intel-Architecture-and-Windows-10</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/07_Advanced-Antivirus-Evasion/7.2-Antimalware-Scan-Interface</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/07_Advanced-Antivirus-Evasion/7.3-Bypassing-AMSI-With-Reflection-in-PowerShell</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/07_Advanced-Antivirus-Evasion/7.4-Wrecking-AMSI-in-PowerShell</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/07_Advanced-Antivirus-Evasion/7.5-UAC-Bypass-vs-Microsoft-Defender</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/07_Advanced-Antivirus-Evasion/7.6-Bypassing-AMSI-in-JScript</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/07_Advanced-Antivirus-Evasion/7.7-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/08_Application-Whitelisting/8.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/08_Application-Whitelisting/8.1-Application-Whitelisting-Theory-and-Setup</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/08_Application-Whitelisting/8.2-Basic-Bypasses</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/08_Application-Whitelisting/8.3-Bypassing-AppLocker-with-PowerShell</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/08_Application-Whitelisting/8.4-Bypassing-AppLocker-with-C-Sharp</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/08_Application-Whitelisting/8.5-Bypassing-AppLocker-with-JScript</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/08_Application-Whitelisting/8.6-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/09_Bypassing-Network-Filters/9.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/09_Bypassing-Network-Filters/9.1-DNS-Filters</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/09_Bypassing-Network-Filters/9.2-Web-Proxies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/09_Bypassing-Network-Filters/9.3-IDS-and-IPS-Sensors</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/09_Bypassing-Network-Filters/9.4-Full-Packet-Capture-Devices</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/09_Bypassing-Network-Filters/9.5-HTTPS-Inspection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/09_Bypassing-Network-Filters/9.6-Domain-Fronting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/09_Bypassing-Network-Filters/9.7-DNS-Tunneling</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/09_Bypassing-Network-Filters/9.8-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/10_Linux-Post-Exploitation/10.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/10_Linux-Post-Exploitation/10.1-User-Configuration-Files</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/10_Linux-Post-Exploitation/10.2-Bypassing-AV</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/10_Linux-Post-Exploitation/10.3-Shared-Libraries</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/10_Linux-Post-Exploitation/10.4-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/11_Kiosk-Breakouts/11.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/11_Kiosk-Breakouts/11.1-Kiosk-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/11_Kiosk-Breakouts/11.2-Command-Execution</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/11_Kiosk-Breakouts/11.3-Post-Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/11_Kiosk-Breakouts/11.4-Privilege-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/11_Kiosk-Breakouts/11.5-Windows-Kiosk-Breakout-Techniques</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/11_Kiosk-Breakouts/11.6-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/12_Windows-Credentials/12.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/12_Windows-Credentials/12.1-Local-Windows-Credentials</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/12_Windows-Credentials/12.2-Access-Tokens</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/12_Windows-Credentials/12.3-Kerberos-and-Domain-Credentials</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/12_Windows-Credentials/12.4-Processing-Credentials-Offline</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/12_Windows-Credentials/12.5-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/13_Windows-Lateral-Movement/13.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/13_Windows-Lateral-Movement/13.1-Remote-Desktop-Protocol</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/13_Windows-Lateral-Movement/13.2-Fileless-Lateral-Movement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/13_Windows-Lateral-Movement/13.3-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/14_Linux-Lateral-Movement/14.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/14_Linux-Lateral-Movement/14.1-Lateral-Movement-with-SSH</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/14_Linux-Lateral-Movement/14.2-DevOps</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/14_Linux-Lateral-Movement/14.3-Kerberos-on-Linux</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/14_Linux-Lateral-Movement/14.4-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/15_Microsoft-SQL-Attacks/15.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/15_Microsoft-SQL-Attacks/15.1-MS-SQL-in-Active-Directory</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/15_Microsoft-SQL-Attacks/15.2-MS-SQL-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/15_Microsoft-SQL-Attacks/15.3-Linked-SQL-Servers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/15_Microsoft-SQL-Attacks/15.4-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/16_Active-Directory-Exploitation/16.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/16_Active-Directory-Exploitation/16.1-AD-Object-Security-Permissions</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/16_Active-Directory-Exploitation/16.2-Kerberos-Delegation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/16_Active-Directory-Exploitation/16.3-Active-Directory-Forest-Theory</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/16_Active-Directory-Exploitation/16.4-Burning-Down-the-Forest</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/16_Active-Directory-Exploitation/16.5-Going-Beyond-the-Forest</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/16_Active-Directory-Exploitation/16.6-Compromising-an-Additional-Forest</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/16_Active-Directory-Exploitation/16.7-Just-Enough-Administration-(JEA)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/16_Active-Directory-Exploitation/16.8-Just-In-Time-(JIT)-Access</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/16_Active-Directory-Exploitation/16.9-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/17_Combining-the-Pieces/17.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/17_Combining-the-Pieces/17.1-Enumeration-and-Shell</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/17_Combining-the-Pieces/17.2-Attacking-Delegation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/17_Combining-the-Pieces/17.3-Owning-the-Domain</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/17_Combining-the-Pieces/17.4-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/18_Trying-Harder---The-Labs/18.0-_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/18_Trying-Harder---The-Labs/18.1-Real-Life-Simulations</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/18_Trying-Harder---The-Labs/18.2-Wrapping-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/02_Offsec/02_OSEP/reference</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/01_Using-Academy-Effectively/01_Introduction-to-the-Penetration-Tester-Path</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/01_Using-Academy-Effectively/02_Academy-Modules-Layout</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/01_Using-Academy-Effectively/03_Academy-Exercises--and--Questions</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/02_Background--and--Preparation/01_Penetration-Testing-Overview</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/02_Background--and--Preparation/02_Laws-and-Regulations</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/02_Background--and--Preparation/03_Penetration-Testing-Process</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/03_Penetration-Testing-Phases---Assessment-Specific-Stages/01_Pre-Engagement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/03_Penetration-Testing-Phases---Assessment-Specific-Stages/02_Information-Gathering</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/03_Penetration-Testing-Phases---Assessment-Specific-Stages/03_Vulnerability-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/03_Penetration-Testing-Phases---Assessment-Specific-Stages/04_Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/03_Penetration-Testing-Phases---Assessment-Specific-Stages/05_Post-Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/03_Penetration-Testing-Phases---Assessment-Specific-Stages/06_Lateral-Movement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/04_Penetration-Testing-Phases---Project-Closeout/01_Proof-of-Concept</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/04_Penetration-Testing-Phases---Project-Closeout/02_Post-Engagement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/00_Penetration-Testing-Process/05_Preparing-for-Real-World-Pentests/01_Practice</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/01_Introduction/01_Infosec-Overview</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/02_Setup/01_Getting-Started-with-a-Pentest-Distro</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/02_Setup/02_Staying-Organized</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/02_Setup/03_Connecting-Using-VPN</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/03_Pentesting-Basics/01_Common-Terms</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/03_Pentesting-Basics/02_Basic-Tools</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/03_Pentesting-Basics/03_Service-Scanning</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/03_Pentesting-Basics/04_Web-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/03_Pentesting-Basics/05_Public-Exploits</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/03_Pentesting-Basics/06_Types-of-Shells</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/03_Pentesting-Basics/07_Privilege-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/03_Pentesting-Basics/08_Transferring-Files</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/04_Getting-Started-with-Hack-The-Box-(HTB)/01_Starting-Out</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/04_Getting-Started-with-Hack-The-Box-(HTB)/02_Navigating-HTB</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/05_Attacking-Your-First-Box/01_Nibbles---Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/05_Attacking-Your-First-Box/02_Nibbles---Web-Footprinting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/05_Attacking-Your-First-Box/03_Nibbles---Initial-Foothold</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/05_Attacking-Your-First-Box/04_Nibbles---Privilege-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/05_Attacking-Your-First-Box/05_Nibbles---Alternate-User-Method---Metasploit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/06_Problem-Solving/01_Common-Pitfalls</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/06_Problem-Solving/02_Getting-Help</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/07_What's-Next_/01_Next-Steps</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/01_Getting-Started/07_What's-Next_/02_Knowledge-Check</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/01_Introduction/01_Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/01_Introduction/02_Introduction-to-Nmap</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/02_Host-Enumeration/01_Host-Discovery</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/02_Host-Enumeration/02_Host-and-Port-Scanning</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/02_Host-Enumeration/03_Saving-the-Results</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/02_Host-Enumeration/04_Service-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/02_Host-Enumeration/05_Nmap-Scripting-Engine</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/02_Host-Enumeration/06_Performance</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/03_Bypass-Security-Measures/01_Firewall-and-IDS_IPS-Evasion</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/03_Bypass-Security-Measures/02_Firewall-and-IDS_IPS-Evasion---Easy-Lab</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/03_Bypass-Security-Measures/03_Firewall-and-IDS_IPS-Evasion---Medium-Lab</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/02_Network-Enumeration-with-Nmap/03_Bypass-Security-Measures/04_Firewall-and-IDS_IPS-Evasion---Hard-Lab</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/01_Introduction/01_Enumeration-Principles</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/01_Introduction/02_Enumeration-Methodology</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/02_Infrastructure-Based-Enumeration/01_Domain-Information</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/02_Infrastructure-Based-Enumeration/02_Cloud-Resources</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/02_Infrastructure-Based-Enumeration/03_Staff</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/01_FTP</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/02_SMB</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/03_NFS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/04_DNS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/05_SMTP</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/06_IMAP-_-POP3</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/07_SNMP</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/08_MySQL</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/09_MSSQL</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/10_Oracle-TNS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/03_Host-Based-Enumeration/11_IPMI</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/04_Remote-Management-Protocols/01_Linux-Remote-Management-Protocols</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/04_Remote-Management-Protocols/02_Windows-Remote-Management-Protocols</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/05_Skills-Assessment/01_Footprinting-Lab---Easy</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/05_Skills-Assessment/02_Footprinting-Lab---Medium</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/03_Footprinting/05_Skills-Assessment/03_Footprinting-Lab---Hard</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/01_Introduction/01_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/02_WHOIS/01_WHOIS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/02_WHOIS/02_Utilizing-WHOIS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/03_DNS--and--Subdomains/01_DNS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/03_DNS--and--Subdomains/02_Digging-DNS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/03_DNS--and--Subdomains/03_Subdomains</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/03_DNS--and--Subdomains/04_Subdomain-Bruteforcing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/03_DNS--and--Subdomains/05_DNS-Zone-Transfers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/03_DNS--and--Subdomains/06_Virtual-Hosts</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/03_DNS--and--Subdomains/07_Certificate-Transparency-Logs</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/04_Fingerprinting/01_Fingerprinting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/05_Crawling/01_Crawling</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/05_Crawling/02_robots.txt</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/05_Crawling/03_.Well-Known-URIs</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/05_Crawling/04_Creepy-Crawlies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/06_Search-Engine-Discovery/01_Search-Engine-Discovery</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/07_Web-Archives/01_Web-Archives</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/08_Automating-Recon/01_Automating-Recon</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/04_Information-Gathering---Web-Edition/09_Skills-Assessment/01_Skills-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/01_Security-Assessments/01_Security-Assessments</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/01_Security-Assessments/02_Vulnerability-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/01_Security-Assessments/03_Assessment-Standards</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/02_Vulnerability-Scoring-and-Reporting/01_Common-Vulnerability-Scoring-System-(CVSS)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/02_Vulnerability-Scoring-and-Reporting/02_Common-Vulnerabilities-and-Exposures-(CVE)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/03_Nessus/01_Vulnerability-Scanning-Overview</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/03_Nessus/02_Getting-Started-with-Nessus</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/03_Nessus/03_Nessus-Scan</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/03_Nessus/04_Advanced-Settings</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/03_Nessus/05_Working-with-Nessus-Scan-Output</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/03_Nessus/06_Scanning-Issues</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/03_Nessus/07_Nessus-Skills-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/04_OpenVAS/01_Getting-Started-with-OpenVAS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/04_OpenVAS/02_OpenVAS-Scan</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/04_OpenVAS/03_Exporting-The-Results</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/04_OpenVAS/04_OpenVAS-Skills-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/05_Vulnerability-Assessment/05_Reporting/01_Reporting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/06_File-Transfers/01_Introduction/01_File-Transfers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/06_File-Transfers/02_File-Transfer-Methods/01_Windows-File-Transfer-Methods</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/06_File-Transfers/02_File-Transfer-Methods/02_Linux-File-Transfer-Methods</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/06_File-Transfers/02_File-Transfer-Methods/03_Transferring-Files-with-Code</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/06_File-Transfers/02_File-Transfer-Methods/04_Miscellaneous-File-Transfer-Methods</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/06_File-Transfers/02_File-Transfer-Methods/05_Protected-File-Transfers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/06_File-Transfers/02_File-Transfer-Methods/06_Catching-Files-over-HTTP_S</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/06_File-Transfers/02_File-Transfer-Methods/07_Living-off-The-Land</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/06_File-Transfers/03_Detect-or-Be-Detected/01_Detection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/06_File-Transfers/03_Detect-or-Be-Detected/02_Evading-Detection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/01_Introduction/01_Shells-Jack-Us-In,-Payloads-Deliver-Us-Shells</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/01_Introduction/02_CAT5-Security's-Engagement-Preparation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/02_Shell-Basics/01_Anatomy-of-a-Shell</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/02_Shell-Basics/02_Bind-Shells</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/02_Shell-Basics/03_Reverse-Shells</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/03_Payloads/01_Introduction-to-Payloads</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/03_Payloads/02_Automating-Payloads--and--Delivery-with-Metasploit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/03_Payloads/03_Crafting-payloads-with-MSFvenom</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/04_Windows-Shells/01_Infiltrating-Windows</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/05_NIX-Shells/01_Infiltrating-Unix_Linux</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/05_NIX-Shells/02_Spawning-Interactive-Shells</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/06_Web-Shells/01_Introduction-to-Web-Shells</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/06_Web-Shells/02_Laudanum,-One-Webshell-to-Rule-Them-All</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/06_Web-Shells/03_Antak-Webshell</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/06_Web-Shells/04_PHP-Web-Shells</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/07_Skills-Assessment/01_The-Live-Engagement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/07_Shells--and--Payloads/08_Additional-Considerations/01_Detection--and--Prevention</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/01_Introduction/01_Preface</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/01_Introduction/02_Introduction-to-Metasploit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/01_Introduction/03_Introduction-to-MSFconsole</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/02_MSF-Components/01_Modules</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/02_MSF-Components/02_Targets</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/02_MSF-Components/03_Payloads</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/02_MSF-Components/04_Encoders</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/02_MSF-Components/05_Databases</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/02_MSF-Components/06_Plugins--and--Mixins</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/03_MSF-Sessions/01_Sessions--and--Jobs</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/03_MSF-Sessions/02_Meterpreter</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/04_Additional-Features/01_Writing--and--Importing-Modules</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/04_Additional-Features/02_Introduction-to-MSFVenom</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/04_Additional-Features/03_Firewall-and-IDS_IPS-evasion</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/08_Using-the-Metasploit-Framework/04_Additional-Features/04_Metasploit-Framework-Updates---August-2020</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/01_Introduction/01_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/02_Password-Cracking-Techniques/01_Introduction-to-Password-Cracking</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/02_Password-Cracking-Techniques/02_Introduction-to-John-The-Ripper</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/02_Password-Cracking-Techniques/03_Introduction-to-Hashcat</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/02_Password-Cracking-Techniques/04_Writing-Custom-Wordlists-and-Rules</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/02_Password-Cracking-Techniques/05_Cracking-Protected-Files</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/02_Password-Cracking-Techniques/06_Cracking-Protected-Archives</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/03_Remote-Password-Attacks/01_Network-Services</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/03_Remote-Password-Attacks/02_Spraying,-Stuffing,-and-Defaults</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/04_Extracting-Passwords-from-Windows-Systems/01_Windows-Authentication-Process</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/04_Extracting-Passwords-from-Windows-Systems/02_Attacking-SAM,-SYSTEM,-and-SECURITY</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/04_Extracting-Passwords-from-Windows-Systems/03_Attacking-LSASS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/04_Extracting-Passwords-from-Windows-Systems/04_Attacking-Windows-Credential-Manager</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/04_Extracting-Passwords-from-Windows-Systems/05_Attacking-Active-Directory-and-NTDS.dit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/04_Extracting-Passwords-from-Windows-Systems/06_Credential-Hunting-in-Windows</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/05_Extracting-Passwords-from-Linux-Systems/01_Linux-Authentication-Process</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/05_Extracting-Passwords-from-Linux-Systems/02_Credential-Hunting-in-Linux</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/06_Extracting-Passwords-from-the-Network/01_Credential-Hunting-in-Network-Traffic</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/06_Extracting-Passwords-from-the-Network/02_Credential-Hunting-in-Network-Shares</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/07_Windows-Lateral-Movement-Techniques/01_Pass-the-Hash-(PtH)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/07_Windows-Lateral-Movement-Techniques/02_Pass-the-Ticket-(PtT)-from-Windows</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/07_Windows-Lateral-Movement-Techniques/03_Pass-the-Ticket-(PtT)-from-Linux</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/07_Windows-Lateral-Movement-Techniques/04_Pass-the-Certificate</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/08_Password-Management/01_Password-Policies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/08_Password-Management/02_Password-Managers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/09_Password-Attacks/09_Skills-Assessment/01_Skills-Assessment---Password-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/01_Introduction/01_Interacting-with-Common-Services</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/02_Protocol-Specific-Attacks/01_The-Concept-of-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/02_Protocol-Specific-Attacks/02_Service-Misconfigurations</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/02_Protocol-Specific-Attacks/03_Finding-Sensitive-Information</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/03_FTP/01_Attacking-FTP</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/03_FTP/02_Latest-FTP-Vulnerabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/04_SMB/01_Attacking-SMB</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/04_SMB/02_Latest-SMB-Vulnerabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/05_SQL-Databases/01_Attacking-SQL-Databases</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/05_SQL-Databases/02_Latest-SQL-Vulnerabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/06_RDP/01_Attacking-RDP</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/06_RDP/02_Latest-RDP-Vulnerabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/07_DNS/01_Attacking-DNS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/07_DNS/02_Latest-DNS-Vulnerabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/08_SMTP/01_Attacking-Email-Services</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/08_SMTP/02_Latest-Email-Service-Vulnerabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/09_Skills-Assessment/01_Attacking-Common-Services---Easy</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/09_Skills-Assessment/02_Attacking-Common-Services---Medium</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/10_Attacking-Common-Services/09_Skills-Assessment/03_Attacking-Common-Services---Hard</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/01_Introduction/01_Introduction-to-Pivoting,-Tunneling,-and-Port-Forwarding</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/01_Introduction/02_The-Networking-Behind-Pivoting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/02_Choosing-The-Dig-Site--and--Starting-Our-Tunnels/01_Dynamic-Port-Forwarding-with-SSH-and-SOCKS-Tunneling</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/02_Choosing-The-Dig-Site--and--Starting-Our-Tunnels/02_Remote_Reverse-Port-Forwarding-with-SSH</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/02_Choosing-The-Dig-Site--and--Starting-Our-Tunnels/03_Meterpreter-Tunneling--and--Port-Forwarding</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/03_Playing-Pong-with-Socat/01_Socat-Redirection-with-a-Reverse-Shell</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/03_Playing-Pong-with-Socat/02_Socat-Redirection-with-a-Bind-Shell</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/04_Pivoting-Around-Obstacles/01_SSH-for-Windows_-plink.exe</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/04_Pivoting-Around-Obstacles/02_SSH-Pivoting-with-sshuttle</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/04_Pivoting-Around-Obstacles/03_Web-Server-Pivoting-with-Rpivot</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/04_Pivoting-Around-Obstacles/04_Port-Forwarding-with-Windows_-Netsh</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/05_Branching-Out-Our-Tunnels/01_DNS-Tunneling-with-Dnscat2</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/05_Branching-Out-Our-Tunnels/02_SOCKS5-Tunneling-with-Chisel</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/05_Branching-Out-Our-Tunnels/03_ICMP-Tunneling-with-SOCKS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/06_Double-Pivots/01_RDP-and-SOCKS-Tunneling-with-SocksOverRDP</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/07_Skills-Assessment/01_Skills-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/08_Additional-Considerations/01_Detection--and--Prevention</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/11_Pivoting,-Tunneling,-and-Port-Forwarding/08_Additional-Considerations/02_Beyond-this-Module</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/01_Setting-The-Stage/01_Introduction-to-Active-Directory-Enumeration--and--Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/01_Setting-The-Stage/02_Tools-Of-The-Trade</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/01_Setting-The-Stage/03_Scenario</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/02_Initial-Enumeration/01_External-Recon-and-Enumeration-Principles</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/02_Initial-Enumeration/02_Initial-Enumeration-of-the-Domain</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/03_Sniffing-out-a-Foothold/01_LLMNR_NBT-NS-Poisoning---from-Linux</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/03_Sniffing-out-a-Foothold/02_LLMNR_NBT-NS-Poisoning---from-Windows</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/04_Sighting-In,-Hunting-For-A-User/01_Password-Spraying-Overview</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/04_Sighting-In,-Hunting-For-A-User/02_Enumerating--and--Retrieving-Password-Policies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/04_Sighting-In,-Hunting-For-A-User/03_Password-Spraying---Making-a-Target-User-List</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/05_Spray-Responsibly/01_Internal-Password-Spraying---from-Linux</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/05_Spray-Responsibly/02_Internal-Password-Spraying---from-Windows</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/06_Deeper-Down-the-Rabbit-Hole/01_Enumerating-Security-Controls</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/06_Deeper-Down-the-Rabbit-Hole/02_Credentialed-Enumeration---from-Linux</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/06_Deeper-Down-the-Rabbit-Hole/03_Credentialed-Enumeration---from-Windows</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/06_Deeper-Down-the-Rabbit-Hole/04_Living-Off-the-Land</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/07_Cooking-with-Fire/01_Kerberoasting---from-Linux</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/07_Cooking-with-Fire/02_Kerberoasting---from-Windows</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/08_An-ACE-in-the-Hole/01_Access-Control-List-(ACL)-Abuse-Primer</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/08_An-ACE-in-the-Hole/02_ACL-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/08_An-ACE-in-the-Hole/03_ACL-Abuse-Tactics</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/08_An-ACE-in-the-Hole/04_DCSync</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/09_Stacking-The-Deck/01_Privileged-Access</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/09_Stacking-The-Deck/02_Kerberos-_Double-Hop_-Problem</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/09_Stacking-The-Deck/03_Bleeding-Edge-Vulnerabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/09_Stacking-The-Deck/04_Miscellaneous-Misconfigurations</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/10_Why-So-Trusting_/01_Domain-Trusts-Primer</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/10_Why-So-Trusting_/02_Attacking-Domain-Trusts---Child--_-Parent-Trusts---from-Windows</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/10_Why-So-Trusting_/03_Attacking-Domain-Trusts---Child--_-Parent-Trusts---from-Linux</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/11_Breaking-Down-Boundaries/01_Attacking-Domain-Trusts---Cross-Forest-Trust-Abuse---from-Windows</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/11_Breaking-Down-Boundaries/02_Attacking-Domain-Trusts---Cross-Forest-Trust-Abuse---from-Linux</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/12_Defensive-Considerations/01_Hardening-Active-Directory</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/12_Defensive-Considerations/02_Additional-AD-Auditing-Techniques</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/13_Skill-Assessment---Final-Showdown/01_AD-Enumeration--and--Attacks---Skills-Assessment-Part-I</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/13_Skill-Assessment---Final-Showdown/02_AD-Enumeration--and--Attacks---Skills-Assessment-Part-II</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/12_Active-Directory-Enumeration--and--Attacks/13_Skill-Assessment---Final-Showdown/03_Beyond-this-Module</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/01_Getting-Started/01_Intro-to-Web-Proxies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/01_Getting-Started/02_Setting-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/02_Web-Proxy/01_Proxy-Setup</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/02_Web-Proxy/02_Intercepting-Web-Requests</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/02_Web-Proxy/03_Intercepting-Responses</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/02_Web-Proxy/04_Automatic-Modification</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/02_Web-Proxy/05_Repeating-Requests</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/02_Web-Proxy/06_Encoding_Decoding</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/02_Web-Proxy/07_Proxying-Tools</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/03_Web-Fuzzer/01_Burp-Intruder</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/03_Web-Fuzzer/02_ZAP-Fuzzer</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/04_Web-Scanner/01_Burp-Scanner</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/04_Web-Scanner/02_ZAP-Scanner</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/04_Web-Scanner/03_Extensions</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/13_Using-Web-Proxies/05_Skills-Assessment/01_Skills-Assessment---Using-Web-Proxies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/01_Introduction/01_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/01_Introduction/02_Web-Fuzzing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/02_Basic-Fuzzing/01_Directory-Fuzzing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/02_Basic-Fuzzing/02_Page-Fuzzing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/02_Basic-Fuzzing/03_Recursive-Fuzzing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/03_Domain-Fuzzing/01_DNS-Records</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/03_Domain-Fuzzing/02_Sub-domain-Fuzzing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/03_Domain-Fuzzing/03_Vhost-Fuzzing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/03_Domain-Fuzzing/04_Filtering-Results</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/04_Parameter-Fuzzing/01_Parameter-Fuzzing---GET</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/04_Parameter-Fuzzing/02_Parameter-Fuzzing---POST</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/04_Parameter-Fuzzing/03_Value-Fuzzing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/14_Attacking-Web-Applications-with-Ffuf/05_Skills-Assessment/01_Skills-Assessment---Web-Fuzzing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/01_Introduction/01_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/01_Introduction/02_Password-Security-Fundamentals</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/02_Brute-Force-Attacks/01_Brute-Force-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/02_Brute-Force-Attacks/02_Dictionary-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/02_Brute-Force-Attacks/03_Hybrid-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/03_Hydra/01_Hydra</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/03_Hydra/02_Basic-HTTP-Authentication</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/03_Hydra/03_Login-Forms</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/04_Medusa/01_Medusa</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/04_Medusa/02_Web-Services</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/05_Custom-Wordlists/01_Custom-Wordlists</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/06_Skills-Assessment/01_Skills-Assessment-Part-1</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/15_Login-Brute-Forcing/06_Skills-Assessment/02_Skills-Assessment-Part-2</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/00_General/01_Introduction</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/01_Databases/01_Intro-to-Databases</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/01_Databases/02_Types-of-Databases</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/02_MySQL/01_Intro-to-MySQL</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/02_MySQL/02_SQL-Statements</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/02_MySQL/03_Query-Results</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/02_MySQL/04_SQL-Operators</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/03_SQL-Injections/01_Intro-to-SQL-Injections</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/03_SQL-Injections/02_Subverting-Query-Logic</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/03_SQL-Injections/03_Using-Comments</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/03_SQL-Injections/04_Union-Clause</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/03_SQL-Injections/05_Union-Injection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/04_Exploitation/01_Database-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/04_Exploitation/02_Reading-Files</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/04_Exploitation/03_Writing-Files</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/05_Mitigations/01_Mitigating-SQL-Injection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/16_SQL-Injection-Fundamentals/06_Closing-it-Out/01_Skills-Assessment---SQL-Injection-Fundamentals</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/01_Getting-Started/01_SQLMap-Overview</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/01_Getting-Started/02_Getting-Started-with-SQLMap</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/01_Getting-Started/03_SQLMap-Output-Description</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/02_Building-Attacks/01_Running-SQLMap-on-an-HTTP-Request</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/02_Building-Attacks/02_Handling-SQLMap-Errors</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/02_Building-Attacks/03_Attack-Tuning</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/03_Database-Enumeration/01_Database-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/03_Database-Enumeration/02_Advanced-Database-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/04_Advanced-SQLMap-Usage/01_Bypassing-Web-Application-Protections</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/04_Advanced-SQLMap-Usage/02_OS-Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/17_SQLMap-Essentials/05_Skills-Assessment/01_Skills-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/18_Cross-Site-Scripting-(XSS)/01_XSS-Basics/01_Intro-to-XSS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/18_Cross-Site-Scripting-(XSS)/01_XSS-Basics/02_Stored-XSS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/18_Cross-Site-Scripting-(XSS)/01_XSS-Basics/03_Reflected-XSS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/18_Cross-Site-Scripting-(XSS)/01_XSS-Basics/04_DOM-XSS</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/18_Cross-Site-Scripting-(XSS)/01_XSS-Basics/05_XSS-Discovery</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/18_Cross-Site-Scripting-(XSS)/02_XSS-Attacks/01_Defacing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/18_Cross-Site-Scripting-(XSS)/02_XSS-Attacks/02_Phishing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/18_Cross-Site-Scripting-(XSS)/02_XSS-Attacks/03_Session-Hijacking</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/18_Cross-Site-Scripting-(XSS)/03_XSS-Prevention/01_XSS-Prevention</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/18_Cross-Site-Scripting-(XSS)/04_Skills-Assessment/01_Skills-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/01_Introduction/01_Intro-to-File-Inclusions</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/02_File-Disclosure/01_Local-File-Inclusion-(LFI)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/02_File-Disclosure/02_Basic-Bypasses</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/02_File-Disclosure/03_PHP-Filters</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/03_Remote-Code-Execution/01_PHP-Wrappers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/03_Remote-Code-Execution/02_Remote-File-Inclusion-(RFI)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/03_Remote-Code-Execution/03_LFI-and-File-Uploads</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/03_Remote-Code-Execution/04_Log-Poisoning</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/04_Automation-and-Prevention/01_Automated-Scanning</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/04_Automation-and-Prevention/02_File-Inclusion-Prevention</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/19_File-Inclusion/05_Skills-Assessment/01_Skills-Assessment---File-Inclusion</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/00_General/01_Intro-to-File-Upload-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/01_Basic-Exploitation/01_Absent-Validation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/01_Basic-Exploitation/02_Upload-Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/02_Bypassing-Filters/01_Client-Side-Validation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/02_Bypassing-Filters/02_Blacklist-Filters</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/02_Bypassing-Filters/03_Whitelist-Filters</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/02_Bypassing-Filters/04_Type-Filters</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/03_Other-Upload-Attacks/01_Limited-File-Uploads</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/03_Other-Upload-Attacks/02_Other-Upload-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/04_Prevention/01_Preventing-File-Upload-Vulnerabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/20_File-Upload-Attacks/05_Skills-Assessment/01_Skills-Assessment---File-Upload-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/00_General/01_Intro-to-Command-Injections</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/01_Exploitation/01_Detection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/01_Exploitation/02_Injecting-Commands</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/01_Exploitation/03_Other-Injection-Operators</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/02_Filter-Evasion/01_Identifying-Filters</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/02_Filter-Evasion/02_Bypassing-Space-Filters</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/02_Filter-Evasion/03_Bypassing-Other-Blacklisted-Characters</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/02_Filter-Evasion/04_Bypassing-Blacklisted-Commands</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/02_Filter-Evasion/05_Advanced-Command-Obfuscation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/02_Filter-Evasion/06_Evasion-Tools</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/03_Prevention/01_Command-Injection-Prevention</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/21_Command-Injections/04_Skills-Assessment/01_Skills-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/00_General/01_Introduction-to-Web-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/01_HTTP-Verb-Tampering/01_Intro-to-HTTP-Verb-Tampering</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/01_HTTP-Verb-Tampering/02_Bypassing-Basic-Authentication</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/01_HTTP-Verb-Tampering/03_Bypassing-Security-Filters</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/01_HTTP-Verb-Tampering/04_Verb-Tampering-Prevention</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/02_Insecure-Direct-Object-References-(IDOR)/01_Intro-to-IDOR</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/02_Insecure-Direct-Object-References-(IDOR)/02_Identifying-IDORs</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/02_Insecure-Direct-Object-References-(IDOR)/03_Mass-IDOR-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/02_Insecure-Direct-Object-References-(IDOR)/04_Bypassing-Encoded-References</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/02_Insecure-Direct-Object-References-(IDOR)/05_IDOR-in-Insecure-APIs</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/02_Insecure-Direct-Object-References-(IDOR)/06_Chaining-IDOR-Vulnerabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/02_Insecure-Direct-Object-References-(IDOR)/07_IDOR-Prevention</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/03_XML-External-Entity-(XXE)-Injection/01_Intro-to-XXE</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/03_XML-External-Entity-(XXE)-Injection/02_Local-File-Disclosure</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/03_XML-External-Entity-(XXE)-Injection/03_Advanced-File-Disclosure</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/03_XML-External-Entity-(XXE)-Injection/04_Blind-Data-Exfiltration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/03_XML-External-Entity-(XXE)-Injection/05_XXE-Prevention</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/22_Web-Attacks/04_Skills-Assessment/01_Web-Attacks---Skills-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/01_Setting-the-Stage/01_Introduction-to-Attacking-Common-Applications</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/01_Setting-the-Stage/02_Application-Discovery--and--Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/02_Content-Management-Systems-(CMS)/01_WordPress---Discovery--and--Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/02_Content-Management-Systems-(CMS)/02_Attacking-WordPress</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/02_Content-Management-Systems-(CMS)/03_Joomla---Discovery--and--Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/02_Content-Management-Systems-(CMS)/04_Attacking-Joomla</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/02_Content-Management-Systems-(CMS)/05_Drupal---Discovery--and--Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/02_Content-Management-Systems-(CMS)/06_Attacking-Drupal</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/03_Servlet-Containers_Software-Development/01_Tomcat---Discovery--and--Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/03_Servlet-Containers_Software-Development/02_Attacking-Tomcat</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/03_Servlet-Containers_Software-Development/03_Jenkins---Discovery--and--Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/03_Servlet-Containers_Software-Development/04_Attacking-Jenkins</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/04_Infrastructure_Network-Monitoring-Tools/01_Splunk---Discovery--and--Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/04_Infrastructure_Network-Monitoring-Tools/02_Attacking-Splunk</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/04_Infrastructure_Network-Monitoring-Tools/03_PRTG-Network-Monitor</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/05_Customer-Service-Mgmt--and--Configuration-Management/01_osTicket</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/05_Customer-Service-Mgmt--and--Configuration-Management/02_Gitlab---Discovery--and--Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/05_Customer-Service-Mgmt--and--Configuration-Management/03_Attacking-GitLab</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/06_Common-Gateway-Interfaces/01_Attacking-Tomcat-CGI</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/06_Common-Gateway-Interfaces/02_Attacking-CGI-Applications---Shellshock</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/07_Thick-Client-Applications/01_Attacking-Thick-Client-Applications</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/07_Thick-Client-Applications/02_Exploiting-Web-Vulnerabilities-in-Thick-Client-Applications</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/08_Miscellaneous-Applications/01_ColdFusion---Discovery--and--Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/08_Miscellaneous-Applications/02_Attacking-ColdFusion</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/08_Miscellaneous-Applications/03_IIS-Tilde-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/08_Miscellaneous-Applications/04_Attacking-LDAP</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/08_Miscellaneous-Applications/05_Web-Mass-Assignment-Vulnerabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/08_Miscellaneous-Applications/06_Attacking-Applications-Connecting-to-Services</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/08_Miscellaneous-Applications/07_Other-Notable-Applications</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/09_Closing-Out/01_Application-Hardening</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/10_Skills-Assessments/01_Attacking-Common-Applications---Skills-Assessment-I</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/10_Skills-Assessments/02_Attacking-Common-Applications---Skills-Assessment-II</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/23_Attacking-Common-Applications/10_Skills-Assessments/03_Attacking-Common-Applications---Skills-Assessment-III</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/01_Introduction/01_Introduction-to-Linux-Privilege-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/02_Information-Gathering/01_Environment-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/02_Information-Gathering/02_Linux-Services--and--Internals-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/02_Information-Gathering/03_Credential-Hunting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/03_Environment-based-Privilege-Escalation/01_Path-Abuse</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/03_Environment-based-Privilege-Escalation/02_Wildcard-Abuse</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/03_Environment-based-Privilege-Escalation/03_Escaping-Restricted-Shells</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/04_Permissions-based-Privilege-Escalation/01_Special-Permissions</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/04_Permissions-based-Privilege-Escalation/02_Sudo-Rights-Abuse</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/04_Permissions-based-Privilege-Escalation/03_Privileged-Groups</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/04_Permissions-based-Privilege-Escalation/04_Capabilities</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/05_Service-based-Privilege-Escalation/01_Vulnerable-Services</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/05_Service-based-Privilege-Escalation/02_Cron-Job-Abuse</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/05_Service-based-Privilege-Escalation/03_LXD</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/05_Service-based-Privilege-Escalation/04_Docker</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/05_Service-based-Privilege-Escalation/05_Kubernetes</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/05_Service-based-Privilege-Escalation/06_Logrotate</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/05_Service-based-Privilege-Escalation/07_Miscellaneous-Techniques</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/06_Linux-Internals-based-Privilege-Escalation/01_Kernel-Exploits</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/06_Linux-Internals-based-Privilege-Escalation/02_Shared-Libraries</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/06_Linux-Internals-based-Privilege-Escalation/03_Shared-Object-Hijacking</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/06_Linux-Internals-based-Privilege-Escalation/04_Python-Library-Hijacking</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/07_Recent-0-Days/01_Sudo</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/07_Recent-0-Days/02_Polkit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/07_Recent-0-Days/03_Dirty-Pipe</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/07_Recent-0-Days/04_Netfilter</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/08_Hardening-Considerations/01_Linux-Hardening</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/24_Linux-Privilege-Escalation/09_Skills-Assessment/01_Linux-Local-Privilege-Escalation---Skills-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/01_Introduction/01_Introduction-to-Windows-Privilege-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/01_Introduction/02_Useful-Tools</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/02_Getting-the-Lay-of-the-Land/01_Situational-Awareness</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/02_Getting-the-Lay-of-the-Land/02_Initial-Enumeration</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/02_Getting-the-Lay-of-the-Land/03_Communication-with-Processes</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/03_Windows-User-Privileges/01_Windows-Privileges-Overview</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/03_Windows-User-Privileges/02_SeImpersonate-and-SeAssignPrimaryToken</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/03_Windows-User-Privileges/03_SeDebugPrivilege</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/03_Windows-User-Privileges/04_SeTakeOwnershipPrivilege</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/04_Windows-Group-Privileges/01_Windows-Built-in-Groups</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/04_Windows-Group-Privileges/02_Event-Log-Readers</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/04_Windows-Group-Privileges/03_DnsAdmins</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/04_Windows-Group-Privileges/04_Hyper-V-Administrators</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/04_Windows-Group-Privileges/05_Print-Operators</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/04_Windows-Group-Privileges/06_Server-Operators</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/05_Attacking-the-OS/01_User-Account-Control</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/05_Attacking-the-OS/02_Weak-Permissions</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/05_Attacking-the-OS/03_Kernel-Exploits</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/05_Attacking-the-OS/04_Vulnerable-Services</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/05_Attacking-the-OS/05_DLL-Injection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/06_Credential-Theft/01_Credential-Hunting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/06_Credential-Theft/02_Other-Files</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/06_Credential-Theft/03_Further-Credential-Theft</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/07_Restricted-Environments/01_Citrix-Breakout</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/08_Additional-Techniques/01_Interacting-with-Users</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/08_Additional-Techniques/02_Pillaging</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/08_Additional-Techniques/03_Miscellaneous-Techniques</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/09_Dealing-with-End-of-Life-Systems/01_Legacy-Operating-Systems</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/09_Dealing-with-End-of-Life-Systems/02_Windows-Server</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/09_Dealing-with-End-of-Life-Systems/03_Windows-Desktop-Versions</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/10_Closing-Thoughts/01_Windows-Hardening</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/10_Closing-Thoughts/02_Windows-Privilege-Escalation-Skills-Assessment---Part-I</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/25_Windows-Privilege-Escalation/10_Closing-Thoughts/03_Windows-Privilege-Escalation-Skills-Assessment---Part-II</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/26_Documentation--and--Reporting/01_Intro/01_Introduction-to-Documentation--and--Reporting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/26_Documentation--and--Reporting/02_Preparation/01_Notetaking--and--Organization</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/26_Documentation--and--Reporting/02_Preparation/02_Types-of-Reports</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/26_Documentation--and--Reporting/02_Preparation/03_Components-of-a-Report</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/26_Documentation--and--Reporting/03_Reporting/01_How-to-Write-Up-a-Finding</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/26_Documentation--and--Reporting/03_Reporting/02_Reporting-Tips-and-Tricks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/26_Documentation--and--Reporting/04_Next-Steps/01_Documentation--and--Reporting-Practice-Lab</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/26_Documentation--and--Reporting/04_Next-Steps/02_Beyond-this-Module---Documentation--and--Reporting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/01_Pre-Engagement/01_Intro-to-Attacking-Enterprise-Networks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/01_Pre-Engagement/02_Scenario--and--Kickoff</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/02_External-Testing/01_External-Information-Gathering</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/02_External-Testing/02_Service-Enumeration--and--Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/02_External-Testing/03_Web-Enumeration--and--Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/02_External-Testing/04_Initial-Access</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/03_Internal-Testing/01_Post-Exploitation-Persistence</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/03_Internal-Testing/02_Internal-Information-Gathering</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/03_Internal-Testing/03_Exploitation--and--Privilege-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/04_Lateral-Movement--and--Privilege-Escalation/01_Lateral-Movement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/04_Lateral-Movement--and--Privilege-Escalation/02_Active-Directory-Compromise</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/04_Lateral-Movement--and--Privilege-Escalation/03_Post-Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/05_Wrapping-Up/01_Engagement-Closeout</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/01_CPTS/27_Attacking-Enterprise-Networks/05_Wrapping-Up/02_Beyond-this-Module</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/00.-Intro-to-Academy/Intro-to-Academy</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/01.-Learning-Process/Learning-Process</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/01a.-Penetration-Testing-Process/Penetration-Testing-Process</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/01b.-Setting-Up/Setting-Up</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/02.-Linux-Fundamentals/Linux-Fundamentals</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/03.-Windows-Fundamentals/Windows-Fundamentals</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/03a.-Introduction-to-Windows-Command-Line/Introduction-to-Windows-Command-Line</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/04.-Introduction-to-Networking/Introduction-to-Networking</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/05.-Web-Requests/Web-Requests</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/06.-Introduction-to-Web-Applications/Introduction-to-Web-Applications</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/07.-JavaScript-Deobfuscation/JavaScript-Deobfuscation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/07a.-Hacking-Wordpress/Hacking-Wordpress</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/07b.-Introduction-to-Bash-Scripting/Introduction-to-Bash-Scripting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/07c.-Intro-to-Network-Traffic-Analysis/Intro-to-Network-Traffic-Analysis</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/08.-Introduction-to-Active-Directory/Introduction-to-Active-Directory</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/09.-Getting-Started/Getting-Started</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/01.-Pre-Engagement/Pre-Engagement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/02.-Information-Gathering/10.-Network-Enumeration-with-Nmap/Network-Enumeration-with-Nmap</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/02.-Information-Gathering/10a.-Introduction-to-Python-3/Introduction-to-Python-3</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/02.-Information-Gathering/10b.-DNS-Enumeration-Python/DNS-Enumeration-Using-Python</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/02.-Information-Gathering/11.-Footprinting/Footprinting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/02.-Information-Gathering/12.-Information-Gathering---Web-Edition/Information-Gathering---Web-Edition</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/02.-Information-Gathering/13.-OSINT---Corporate-Recon/OSINT---Corporate-Recon</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/02.-Information-Gathering/Info-Gathering</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/03.-Vulnerability-Assessment/14.-Vulnerability-Assessment/Vulnerability-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/03.-Vulnerability-Assessment/17.-Using-the-Metasploit-Framework/Using-the-Metasploit-Framework</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/03.-Vulnerability-Assessment/Vulnerability-Assessment</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/04.-Exploitation/18.-Password-Attacks/Password-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/04.-Exploitation/18a.-Cracking-Passwords-with-Hashcat/Cracking-Passwords-with-Hashcat</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/04.-Exploitation/19.-Attacking-Common-Services/Attacking-Common-Services</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/04.-Exploitation/20.-Pivoting,-Tunneling--and--Port-Forwarding/Pivoting,-Tunneling--and--Port-Forwarding</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/04.-Exploitation/21.-Active-Directory-Enumeration--and--Attacks/Active-Directory-Enumeration--and--Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/04.-Exploitation/21a.-Using-CrackMapExec/Using-CrackMapExec</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/04.-Exploitation/21b.-Active-Directory-LDAP/Active-Directory-LDAP</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/04.-Exploitation/21c.-Active-Directory-PowerView/Active-Directory-PowerView</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/04.-Exploitation/21d.-Active-Directory-BloodHound/Active-Directory-BloodHound</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/04.-Exploitation/Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/22.-Using-Web-Proxies/Using-Web-Proxies</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/23.-Attacking-Web-Applications-with-Ffuf/Attacking-Web-Applications-with-Ffuf</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/24.-Login-Brute-Forcing/Login-Brute-Forcing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/25.-SQL-Injection-Fundamentals/SQL-Injection-Fundamentals</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/26.-SQLMap-Essentials/SQLMap-Essentials</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/26a.-Blind-SQL-Injection/Blind-SQL-Injection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/27.-Cross-Site-Scripting-(XSS)/Cross-Site-Scripting-(XSS)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/28.-File-Inclusion/File-Inclusion</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/29.-Command-Injections/Command-Injections</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/30.-Web-Attacks/Web-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/31.-Attacking-Common-Applications/Attacking-Common-Applications</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/31a.-Bug-Bounty-Hunting-Process/Bug-Bounty-Hunting-Process</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/31b.-Broken-Authentication/Broken-Authentication</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/31c.-File-Upload-Attacks/File-Upload-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/31d.-Server-side-Attacks/Server-side-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/31e.-Session-Security/Session-Security</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/31f.-Web-Service--and--API-Attacks/Web-Service--and--API-Attacks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/31g.-Attacking-Authentication-Mechanisms/Attacking-Authentication-Mechanisms</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/05.-Web-Exploitation/Web-Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/06.-Post-Exploitation/32.-Linux-Privilege-Escalation/Linux-Privilege-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/06.-Post-Exploitation/33.-Windows-Privilege-Escalation/Windows-Privilege-Escalation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/06.-Post-Exploitation/Post-Exploitation</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/07.-Lateral-Movement/Lateral-Movement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/08.-Proof-of-Concept/34a.-Intro-to-Assembly-Language/Intro-to-Assembly-Language</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/08.-Proof-of-Concept/34b.-Stack-Based-Buffer-Overflows-on-Linux-x86/Stack-Based-Buffer-Overflows-on-Linux-x86</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/08.-Proof-of-Concept/34c.-Stack-Based-Buffer-Overflows-on-Windows-x86/Stack-Based-Buffer-Overflows-on-Windows-x86</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/08.-Proof-of-Concept/Proof-of-Concept</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/09.-Post-Engagement/35.-Documentation--and--Reporting/Documentation--and--Reporting</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/09.-Post-Engagement/36.-Attacking-Enterprise-Networks/Attacking-Enterprise-Networks</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/09.-Post-Engagement/Post-Engagement</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/10.-Misc/MacOS-Fundamentals/MacOS-Fundamentals</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/10.-Misc/Misc</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/10.-Misc/Secure-Coding-101---JavaScript/Secure-Coding-101---JavaScript</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/10.-Misc/Whitebox-Pentesting-101/Whitebox-Pentesting-101</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Academy/HTB-Academy</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Challenges/Misc/Canvas</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Challenges/Misc/Eternal-Loop</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Challenges/Misc/MisDIRection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Challenges/Misc/Query</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Challenges/Misc/Sigma-Technology</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Challenges/Misc/Triangles</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/HTB</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Machines/RedPanda/RedPanda</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Machines/curling</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Machines/laboratory</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Machines/openadmin</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Machines/reddish</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/03_HTB/10_Penetration-Testing-Certification/Pro-Labs/dante</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/OSCP-Box-List</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Play/Loly</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Play/Monitoring</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Play/Potato</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Play/Stapler</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Play/driftingblues</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Play/eLection</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Apex</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/BBSCute</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Bratarina</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/ClamAV</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Educated</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Fantastic</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Hawat</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Hetemit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Hunit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Mantis</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Marketing</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Marshalled</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Mzeeav</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Nibbles</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Nukem</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Payday</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Pebbles</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Peppo</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Postfish</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Quackerjack</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Readys</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Snookums</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Sorcerer</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Sybaris</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Walla</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/Wombo</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/XposedAPI</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/ZenPhoto</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/bullyBox</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Linux/vmdak</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Windows/Billyboss</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Windows/Craft</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Windows/Hokkaido</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Windows/MedJed</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Windows/Nagoya</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/Lainkusanagi/Windows/Nara</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Astronaut</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Blackgate</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Boolean</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Clue</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Cockpit</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Codo</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Crane</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Exfiltrated</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Extplorer</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Fired</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Flu</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Hub</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Image</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Jordak</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/LaVita</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Levram</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Ochima</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/PC</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Pelican</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Press</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/RubyDome</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/SPX</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Scrutiny</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Twiggy</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/Zipper</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/law</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Linux/TJ-Null/pyLoader</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Windows/Algernon</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Windows/Craft2</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Windows/DVR4</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Windows/Hepet</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Windows/Hutch</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Windows/Kevin</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Windows/Nickel</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Windows/Resourced</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Windows/Shenzi</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/Proving-Ground/Practice/Windows/Slort</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/Bob-(192.168.1.198)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/DC9-(192.168.1.189)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/Development-(192.168.1.185)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/FALL-(192.168.1.188)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/JOY-(192.168.1.184)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/MERCYv2-(192.168.1.187)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/Tommy-boy-(192.168.1.195)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/derpnstink-(192.168.1.194)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/misdirection-(192.168.1.191)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/nullbyte-(192.168.1.197)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/prime-(192.168.1.190)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/08_LABs/VulHub/PWK-bak/sar-(192.168.1.192)</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/09_CTF/HTB-2025/2</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/09_CTF/HTB-2025/Whispers-of-the-Moonbeam</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/09_CTF/TryOut-2025/Guild</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/08_Learning--and--Practice/09_CTF/TryOut-2025/Labyrinth-Linguist</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/09_RedTeam-Project/01-Tradevan/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/09_RedTeam-Project/01-Tradevan/_Creds</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/09_RedTeam-Project/01-Tradevan/_Misc</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/09_RedTeam-Project/01-Tradevan/_Payload</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/09_RedTeam-Project/Note</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/GEMINI</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/QuickNote</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/QuickNote_template</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/What-I-learned</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url><url>
    <loc>https://notes.henderson-redteam.org/</loc>
    <lastmod>2026-03-05T20:41:03.000Z</lastmod>
  </url></urlset>