<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://cybsecn.surajv5.in</loc><changefreq>always</changefreq><priority>1</priority><lastmod>2025-12-03T12:24:44.789Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/intro</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/security-and-risk-management</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/asset-security</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/security-architecture-engineering</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/linux-architecture</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/linux-architecture/distributions-of-linux</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/linux-architecture/installing-applications-via-packages-manager</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/penetration-tester</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/filesystem-hierarchy-standard-fhs</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/c3</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/c3/module-3</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/m4-databases-and-sql</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/m4-databases-and-sql/sql-filtering-versus-linux-filtering</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/m4-databases-and-sql/query-a-database</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.675Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/m4-databases-and-sql/the-where-clause-and-basic-operators</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/m4-databases-and-sql/operators-for-filtering-dates-and-numbers</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/intro-of-googles-cybersecurity-course/m4-databases-and-sql/aggregate-functions</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/assets-threats-and-vulnerabilities</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/assets-threats-and-vulnerabilities/module-1</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/assets-threats-and-vulnerabilities/module-2</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/assets-threats-and-vulnerabilities/module-3</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/google/assets-threats-and-vulnerabilities/module-4</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/linux-commands</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/linux-fundamentals</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/linux-fundamentals/linux-structure</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/linux-fundamentals/introduction-to-shell</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/linux-fundamentals/introduction-to-shell/prompt-description</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/linux-fundamentals/introduction-to-shell/system-information</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/linux-fundamentals/workflow</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/linux-fundamentals/workflow/navigation</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/linux-fundamentals/workflow/working-with-files-and-directories</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/network-enumeration-with-map</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/network-enumeration-with-map/introduction-to-nmap</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/network-enumeration-with-map/host-discovery</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/network-enumeration-with-map/host-and-port-scanning</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/network-enumeration-with-map/saving-the-results</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/network-enumeration-with-map/service-enumeration</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/network-enumeration-with-map/nmap-scripting-engine</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/network-enumeration-with-map/performance</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/network-enumeration-with-map/firewall-and-idsips-evasion</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/metasploit-framework</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/metasploit-framework/introduction-to-metasploit</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/metasploit-framework/introduction-to-msfconsole</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/metasploit-framework/modules</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/metasploit-framework/targets</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/metasploit-framework/payloads</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/metasploit-framework/encoders</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/metasploit-framework/databases</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/metasploit-framework/plugins</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url><url><loc>https://cybsecn.surajv5.in/notes/htb/metasploit-framework/untitled-page-1749717952203</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2025-08-29T22:14:44.676Z</lastmod></url></urlset>