<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://notes.chrisgrigsby.com/Active_Directory/AD_Attacks/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Active_Directory/AD_Enumeration/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Active_Directory/AD_Persistence/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/API_Testing/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/Abusing_PATH/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Access_Control/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Advanced_SQLi/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/Misc/Aircrack-ng/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/Antivirus_Evasion/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Authentication/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Autopsy/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Brim/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/Brute_Forcing/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/Buffer_Overflow/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Business_Logic/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/DevSecOps/CI_CD_and_Build_Security/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/CORS_and_SOP/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/CSRF/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Clickjacking/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Command_Line_Cheat_Sheet/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/DevSecOps/Container_Hardening/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/DevSecOps/Container_Vulnerabilities/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Post_Exploitation/Credentials_Harvesting/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reconnaissance/DNS/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/DOM_Based/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/Misc/Defend_Against_Phishing/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/DevSecOps/Dependency_Management/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Essential_Skills_Labs/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/FTP/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/Misc/File_Analysis/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/File_Inclusion_Traversal/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Post_Exploitation/File_Transfers/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/File_Upload_Bypass/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/File_Upload_Vulnerabilities/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/Git_Exploitation/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/GraphQL/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/HTTP_Host_Header/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/HTTP_Request_Smuggling/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Information_Disclosure/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/DevSecOps/Infrastructure_as_Code/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Insecure_Deserialization/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/JWT/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/Juice_Shop/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/KAPE/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/KeePass/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/Kerberos_Enum/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/DevSecOps/Kubernetes/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/LAPS/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/LDAP/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/LDAP_Injection/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Linux_Forensics/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Post_Exploitation/Linux_Post_Exploitation/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/MSSQL/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/Metasploit/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/Methodology_Checklist/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/Misc_Notes/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/MySQL/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Mystery_Labs/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/NFS/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reconnaissance/Network_Scanning/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/NoSQL_Injection/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/OAuth/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/ORM_Injection/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reconnaissance/OSINT/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/OS_Injection/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Post_Exploitation/Payload_Delivery/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Phishing/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Post_Exploitation/Port_Forwarding/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Practice_Test/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Prototype_Pollution/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/Public_Exploits/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/RPC/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/Misc/RSA_Encryption/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Race_Conditions/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Redline/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/Misc/Reverse_Engineering/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/SMB/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/SMTP/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/SNMP/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/SQL_Injection/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/SSH/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/SSRF/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/SSTI/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/Misc/Security_Engineer/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Server_Side_Vulnerabilities/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Post_Exploitation/Shells/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Snort_Cheat_Sheet/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Splunk/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Post_Exploitation/Steganography/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Sysmon/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/TShark/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Velociraptor/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/WebSockets/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Web_Cache_Deception/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Web_Cache_Poisoning/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/Web_LLM_Attacks/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/Web_Servers/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Windows_Forensics/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Windows_Local_Persistence/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Post_Exploitation/Windows_Privesc/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Windows_x64_Assembly/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Wireshark/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/Wireshark_2/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/XSS/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/XXE/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Post_Exploitation/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Active_Directory/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reference/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Reconnaissance/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Service_Enumeration/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Web_Application/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/Misc/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/SOC/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/DevSecOps/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/Defensive_Security/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/</loc>
</url>
</urlset>
