<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://defektive.github.io/docs/domain-takeovers/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/</loc><lastmod>2024-08-28T15:32:26-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/domain-takeovers/05-firebase/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/05-preqs/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/domain-takeovers/05-squarespace/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/10-introduction/</loc><lastmod>2024-08-28T15:39:00-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/15.5-infrastructure/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/15-not-covered/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/16-lab-connect/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/16.5-roe/</loc><lastmod>2024-08-28T15:39:00-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/random/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/20-setup-op-dir/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/24-osint/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/25-mailhog/</loc><lastmod>2024-08-28T15:39:00-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/30-gophish/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/updates/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/31-target-aquistion/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/32-target-aquistion-git/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/35-basic-cred-harvest/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/40-state-review-1/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/45-implant-setup/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/50-generating-sliver-implant/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/55-basic-implant-delivery/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/60-state-review-ii/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/65-modlishka/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/70-modlishka-sso/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/75-reconfigure-modlishka/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/80-testing-modlishka-mfa-bypass/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/85-not-so-basic-phishing/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/100-email-filtering-bypass/</loc><lastmod>2024-08-28T15:39:00-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/105-terminate-to-implant-download/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/110-better-payload/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/120-bot-detection/</loc><lastmod>2025-12-22T21:43:43-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/125-traefik-reverse-proxy/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/phishing-credential-harvesting-and-beyond/200-wrap-up/</loc><lastmod>2024-08-28T15:39:00-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/2025/10/31/publish-flutter-app-to-google-play-using-github-actions/</loc><lastmod>2025-11-01T17:12:32-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/2025/01/09/adventures-in-python/</loc><lastmod>2025-01-09T20:58:59-07:00</lastmod></url><url><loc>https://defektive.github.io/docs/code-review/05-php/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/2024/08/31/packer-ubuntu-noble-and-virtualbox/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/2024/08/27/adopting-docsy-theme/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/phishing/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/saintcon/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/2023/09/30/saintcon-training/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/training/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/use-yubikey-with-keypassxc/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/use-aws-credentials-stored-in-keepassxc/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/curl/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/2021/02/17/curl-resolve-dns-through-proxy/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/dns/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/socks/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/2020/01/30/cloud-metadata-urls/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/cloud-metadata-urls/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/hacking/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/ssrf/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/pfsense/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/2019/04/23/pfsense-and-selks/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/random/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/selks/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/anyproxy/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/2019/03/11/anyproxy-intercept/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/not-work/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/2019/03/01/random-shell-scripting-things-i-may-use-in-the-future/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/shell-script/</loc><lastmod>2024-08-31T14:30:55-06:00</lastmod></url><url><loc>https://defektive.github.io/about/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/blog/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url><url><loc>https://defektive.github.io/categories/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/tags/domain-takeover/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/categories/how-to/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/docs/</loc><lastmod>2024-08-31T13:56:50-06:00</lastmod></url><url><loc>https://defektive.github.io/search/</loc><lastmod>2024-08-28T12:25:06-06:00</lastmod></url></urlset>