<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(0)%20nmap/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(111)%20NFS/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(135,137,139,145,593)%20RPC/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(137,138,445)%20SMB/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(1433)%20MSSQL/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(161,162)%20SNMP/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(21)%20FTP/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(22)%20SSH/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(25)%20SMTP/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(3306)%20MySQL/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(389,%20636)%20LDAP/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(53)%20DNS/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(80,443,8080)%20Web%20Servers/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/(88)%20Kerberos/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/5%20-%20Unsorted%20Security/AD%20Methodology%20Notes/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/5%20-%20Unsorted%20Security/AD%20TCM/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/5%20-%20Unsorted%20Security/Abusing%20Macros/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/5%20-%20Unsorted%20Security/Abusing%20PATH/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/5%20-%20Unsorted%20Security/Abusing%20Windows%20Library/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/3%20-%20Post-Exploit/Active%20Directory/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/3%20-%20Post-Exploit/After%20Linux%20Foothold/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/3%20-%20Post-Exploit/After%20Windows%20Foothold/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/5%20-%20Unsorted%20Security/Antivirus%20Evasion/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/01-Authentication-and-Session/Authentication%20Vulnerabilties/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/2%20-%20Exploit/Beloved%20Shells/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/Brute%20Forcing/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/2%20-%20Exploit/Buffer%20Overflow/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/5%20-%20Unsorted%20Security/Burp%20Suite%20Notes/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/DevSecOps/CI%20CD%20and%20Build%20Security/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/02-Client-Side/CORS%20-%20Cross-Origin%20Resource%20Sharing/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/02-Client-Side/CSRF%20-%20Cross-Site%20Request%20Forgery/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/5%20-%20Unsorted%20Security/Checklist%20to%20Run%20Every%20Time/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/02-Client-Side/Clickjacking/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/DevSecOps/Container%20Hardening/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/DevSecOps/Container%20Vulnerabilities/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/Credentials%20Harvesting/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/DevSecOps/Dependency%20Management/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/00-Specific_Labs/Essential%20Skills%20Labs/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/04-Server-Side/File%20Inclusion%20and%20Directory%20Traversal/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/2%20-%20Exploit/File%20Inclusion/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/3%20-%20Post-Exploit/File%20Transfers/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/2%20-%20Exploit/Generating%20Shellcode/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/I&apos;m%20stuck/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/DevSecOps/Infrastructure%20as%20Code/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/01-Authentication-and-Session/JWT%20-%20JSON%20Web%20Tokens/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/3%20-%20Post-Exploit/Kerberos/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/DevSecOps/Kubernetes/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/00-Specific_Labs/Mystery%20Labs/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/01-Authentication-and-Session/OAuth%20authentication/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/OSINT/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/Persisting%20Active%20Directory/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/3%20-%20Post-Exploit/Port%20Forwarding,%20Mirroring/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/00-Specific_Labs/Practice%20Test/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/2%20-%20Exploit/Public%20Exploits/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/2%20-%20Exploit/SQLi%20Exploits/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/3%20-%20Post-Exploit/Steganography/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/00-Specific_Labs/THM_Client-Side_What&apos;s%20Your%20Name/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/00-Specific_Labs/THM_RequestS_El%20Bandito/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/3%20-%20Post-Exploit/Upgrading%20Shell/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/2%20-%20Exploit/XSS/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/07-Caching-and-Browser-Edge/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/02-Client-Side/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/01-Authentication-and-Session/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/03-Injection/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/00-Specific_Labs/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/04-Server-Side/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/08-Access-Control-and-Logic/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/05-HTTP-and-Infrastructure/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/06-API-and-Modern/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/4%20-%20Web_Application/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/5%20-%20Unsorted%20Security/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/2%20-%20Exploit/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/3%20-%20Post-Exploit/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/DevSecOps/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/SOC%20Level%201/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/Misc/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/1%20-%20Enumeration/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/</loc>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/SOC%20Level%201/LinuxForensicsCheatsheet-1651286283085.pdf</loc>
<lastmod>2026-04-19T16:52:35+00:00</lastmod>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/SOC%20Level%201/WindowsForensicsCheatsheet-TryHackMe-1642092762578.pdf</loc>
<lastmod>2026-04-19T16:52:35+00:00</lastmod>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/SOC%20Level%201/WindowsForensicsCheatsheetTryHackMe-1670190536973.pdf</loc>
<lastmod>2026-04-19T16:52:35+00:00</lastmod>
</url>
<url>
<loc>https://notes.chrisgrigsby.com/6%20-%20Misc%20THM%20Notes/SOC%20Level%201/redline_docs.pdf</loc>
<lastmod>2026-04-19T16:52:35+00:00</lastmod>
</url>
</urlset>
