<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://4khil4braham.com/</loc></url><url><loc>https://4khil4braham.com/cheat-sheets</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cheat-sheets/bloodhound-query-cheat-sheet-01</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cheat-sheets/bloodhound-query-cheat-sheet-02</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cheat-sheets/cheat-sheets-list</loc><lastmod>2025-07-06T22:19:34.339Z</lastmod></url><url><loc>https://4khil4braham.com/cheat-sheets/cve-2021-44228-log4shell</loc></url><url><loc>https://4khil4braham.com/cheat-sheets/ffuf-cheat-sheet</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cheat-sheets/metasploit-cheat-sheet</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cheat-sheets/sqlmap-cheat-sheet</loc><lastmod>2026-02-25T11:41:21.143Z</lastmod></url><url><loc>https://4khil4braham.com/cheat-sheets/stealth-nmap-cheat-sheet</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/aws-certified-cloud-practitioner-aws-ccp</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/aws-certified-security-specialty-aws-css</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/aws-certified-solutions-architect-aws-saa</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/azure-certified-security-engineer-az-500</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/azure-cloud-fundamentals-az-900</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/certifications-list</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/certifications-list/armorcode-certified-associate</loc><lastmod>2025-10-31T10:24:17.451Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/certifications-list/giac-red-team-professional-grtp</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/certifications-list/hackthebox-pentester-level-i-pt-i</loc><lastmod>2026-01-09T08:29:38.693Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/certifications-list/hackthebox-red-team-operator-level-i-rto-i</loc><lastmod>2026-01-09T08:28:32.027Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/certifications-list/vanta-certified-admin</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/cyberwarfare-labs-certified-red-team-infra-developer-crt-id</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/giac-cloud-penetration-tester-gcpn</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/giac-cloud-security-automation-gcsa</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/giac-security-leadership-gslc</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/certifications/hackthebox-red-team-operator-level-i-rtoi</loc><lastmod>2026-02-25T11:22:10.211Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights</loc><lastmod>2026-01-10T05:19:04.118Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/certifications-list</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/certifications-list/univerty-of-maryland-cryptography</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/certifications-list/univerty-of-maryland-hardware-security</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/certifications-list/univerty-of-maryland-software-security</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/certifications-list/univerty-of-maryland-usable-security</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/cyberark-red-team-ttp</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/san-sec540-cloud-security-and-decsecops-automation</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/sans-mgt512-security-leadership-essentials</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/sans-sec564-red-team-operations-and-adversary-emulation</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/sans-sec565-red-team-operations-and-advanced-adversary-emulation</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/highlights/training/sans-sec588-cloud-penetration-testing</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/adversary-emulation</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/ai-security</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/apt-simulation</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/aws</loc></url><url><loc>https://4khil4braham.com/cyber-security/skills/azure</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/cloud-security</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/cloud-security-automation</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/container-security</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/cybersecurity-strategy</loc><lastmod>2026-01-25T10:23:10.225Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/devsecops</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/gcp</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/infrastructure-security</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/network-exploitation</loc></url><url><loc>https://4khil4braham.com/cyber-security/skills/network-security</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/offensive-security</loc></url><url><loc>https://4khil4braham.com/cyber-security/skills/penetration-testing</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/product-security</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/purple-teaming</loc></url><url><loc>https://4khil4braham.com/cyber-security/skills/red-team-automation</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/red-team-infrastructure-automation</loc></url><url><loc>https://4khil4braham.com/cyber-security/skills/red-team-infrastructure-development</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/red-team-leadership</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/red-team-operations</loc></url><url><loc>https://4khil4braham.com/cyber-security/skills/red-teaming</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/risk-management</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/security-architecture</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/security-automation</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/security-awareness</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/security-consulting</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/security-engineering</loc></url><url><loc>https://4khil4braham.com/cyber-security/skills/security-leadership</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/security-program-development</loc></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/counter-adversary-intelligence</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/detection-engineering</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/devsecops</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/process-design</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/project-management</loc><lastmod>2026-01-09T08:20:16.530Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/purple-teaming</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/scrum</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/security-portfolio-modernization</loc><lastmod>2026-01-09T08:20:16.530Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/security-program-development</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/siem-engineering</loc><lastmod>2026-01-09T08:20:16.530Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/soar-automations</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/skills-list/vendor-evaluations</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/social-engineering</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/stakeholder-communication</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/stride</loc></url><url><loc>https://4khil4braham.com/cyber-security/skills/threat-intelligence</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/threat-modelling</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/vulnerability-assessment</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/vulnerability-research</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/vulnerability-scanning</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/web-application-security</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/skills/web-services-security</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools</loc><lastmod>2026-02-28T18:31:02.755Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/aks</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/aks/amazon-cloudformation</loc></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-cloudwatch</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-detective</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-ec2</loc></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-ecr</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-ecs</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-eks</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-fargate</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-inspector</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-lightsail</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-route-53</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-s3</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-sns</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/amazon-workspaces</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/ansible</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/aws-autoscaling</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/aws-cloud-formation</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/aws-elb</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/aws-iam</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/aws-lamba</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-ad</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-bastion</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-blob-storage</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-devops</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-devtest-labs</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-dns</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-files</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-firewall</loc></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-front-door</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-functions</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-lab-services</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-policy</loc></url><url><loc>https://4khil4braham.com/cyber-security/tools/azure-virtual-desktop</loc></url><url><loc>https://4khil4braham.com/cyber-security/tools/bash</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/bloodhound</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/brute-ratel</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/burp-suite</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/clouddocit</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/cobalt-strike</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/container-instance</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/covenant</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/crowstrike-falcon</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/empire</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/ghost-pack</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/hyperglance</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/ibm-appscan</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/iriusrisk</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/load-balancer</loc></url><url><loc>https://4khil4braham.com/cyber-security/tools/metasploit-pro</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/amazon-ec2</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/aws-lamda</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/aws-waf</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/cato</loc><lastmod>2026-01-09T09:47:10.727Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/datadog</loc><lastmod>2026-01-09T09:46:27.598Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/microsoft-defender-xdr</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/mitre-attck</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/nessus</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/network-manager</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/network-watcher</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/nexpose</loc><lastmod>2026-02-25T11:22:10.211Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/night-hawk</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/nmap</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/palo-alto-cortex-xdr</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/powershell</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/python</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/qualys</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/redelk</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/scythe</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/sharphound</loc></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/sliver</loc></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/spiderfoothx</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/splunk</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/synk</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/synopsys-black-duck</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/synopsys-whitehat</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/terraform</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/threatdragon</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/threatmodeller</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/tines</loc><lastmod>2026-01-13T06:30:00.344Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/torq</loc><lastmod>2025-07-06T22:28:21.721Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/virtual-machines</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/cyber-security/tools/tools-list/vulcan</loc><lastmod>2025-11-05T16:51:38.276Z</lastmod></url><url><loc>https://4khil4braham.com/hack-the-box</loc><lastmod>2025-07-06T22:19:34.339Z</lastmod></url><url><loc>https://4khil4braham.com/hack-the-box/hack-the-box-list</loc><lastmod>2025-07-06T22:19:34.339Z</lastmod></url><url><loc>https://4khil4braham.com/posts</loc><lastmod>2026-02-25T11:32:21.702Z</lastmod></url><url><loc>https://4khil4braham.com/posts/cve</loc><lastmod>2026-03-01T07:42:32.203Z</lastmod></url><url><loc>https://4khil4braham.com/posts/cve/cheat-sheets-list</loc><lastmod>2026-01-11T09:22:26.942Z</lastmod></url><url><loc>https://4khil4braham.com/posts/cve/cve-2021-44228-log4shell</loc><lastmod>2026-02-25T11:31:01.284Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode</loc><lastmod>2026-03-26T19:10:24.125Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/0001-two-sum</loc><lastmod>2026-03-01T07:49:19.669Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/0009-palindrome-number</loc><lastmod>2026-03-01T07:49:19.669Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode</loc><lastmod>2026-02-25T11:23:36.514Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0013-roman-to-integer</loc><lastmod>2026-02-25T11:29:04.762Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0014-longest-common-prefix</loc><lastmod>2026-02-25T11:29:04.762Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0020-valid-parentheses</loc><lastmod>2026-02-25T11:34:49.196Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0021-merge-two-sorted-lists</loc><lastmod>2026-02-25T11:42:22.987Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0026-remove-duplicates-from-sorted-array</loc><lastmod>2026-02-25T11:51:07.899Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0027-remove-element</loc><lastmod>2026-02-25T11:55:19.036Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0028-find-the-index-of-the-first-occurrence-in-a-string</loc><lastmod>2026-02-25T11:57:10.472Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0035-search-insert-position</loc><lastmod>2026-02-26T06:08:17.074Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0058-length-of-last-word</loc><lastmod>2026-02-26T15:14:45.777Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0066-plus-one</loc><lastmod>2026-02-26T20:06:19.258Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0067-add-binary</loc><lastmod>2026-03-08T15:05:07.492Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0069-sqrtx</loc><lastmod>2026-02-27T06:13:10.678Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0070-climbing-stairs</loc><lastmod>2026-02-27T15:11:16.795Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0083-remove-duplicates-from-sorted-list</loc><lastmod>2026-02-27T20:08:37.980Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0088-merge-sorted-array</loc><lastmod>2026-02-28T06:08:52.085Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0094-binary-tree-inorder-traversal</loc><lastmod>2026-03-17T19:10:56.896Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0100-same-tree</loc><lastmod>2026-03-13T19:09:17.685Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0101-symmetric-tree</loc><lastmod>2026-03-07T20:16:08.339Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0104-maximum-depth-of-binary-tree</loc><lastmod>2026-03-07T06:12:28.059Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0108-convert-sorted-array-to-binary-search-tree</loc><lastmod>2026-03-09T05:16:12.885Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0110-balanced-binary-tree</loc><lastmod>2026-03-14T05:16:44.721Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0111-minimum-depth-of-binary-tree</loc><lastmod>2026-03-15T05:16:30.902Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0112-path-sum</loc><lastmod>2026-03-19T14:10:27.105Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0118-pascals-triangle</loc><lastmod>2026-02-28T15:09:30.286Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0119-pascals-triangle-ii</loc><lastmod>2026-03-14T14:02:07.824Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0121-best-time-to-buy-and-sell-stock</loc><lastmod>2026-03-01T07:49:19.669Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0125-valid-palindrome</loc><lastmod>2026-03-01T15:04:48.139Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0136-single-number</loc><lastmod>2026-02-28T20:15:02.368Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0141-linked-list-cycle</loc><lastmod>2026-03-01T20:15:47.593Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0144-binary-tree-preorder-traversal</loc><lastmod>2026-03-21T05:05:27.381Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0145-binary-tree-postorder-traversal</loc><lastmod>2026-03-21T14:13:56.370Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0160-intersection-of-two-linked-lists</loc><lastmod>2026-03-08T19:10:52.791Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0168-excel-sheet-column-title</loc><lastmod>2026-03-14T19:03:28.898Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0169-majority-element</loc><lastmod>2026-03-02T06:13:37.948Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0171-excel-sheet-column-number</loc><lastmod>2026-03-13T14:14:37.907Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0190-reverse-bits</loc><lastmod>2026-03-02T20:10:36.042Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0191-number-of-1-bits</loc><lastmod>2026-03-03T06:03:17.013Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0202-happy-number</loc><lastmod>2026-03-09T19:16:19.852Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0203-remove-linked-list-elements</loc><lastmod>2026-03-16T19:12:20.856Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0205-isomorphic-strings</loc><lastmod>2026-03-16T14:17:13.318Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0206-reverse-linked-list</loc><lastmod>2026-03-03T15:01:36.999Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0217-contains-duplicate</loc><lastmod>2026-03-02T15:03:45.196Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0219-contains-duplicate-ii</loc><lastmod>2026-03-20T05:16:09.063Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0226-invert-binary-tree</loc><lastmod>2026-03-03T20:15:57.742Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0228-summary-ranges</loc><lastmod>2026-03-15T14:16:37.734Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0231-power-of-two</loc><lastmod>2026-03-18T05:12:14.355Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0232-implement-queue-using-stacks</loc><lastmod>2026-03-15T19:16:06.439Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0234-palindrome-linked-list</loc><lastmod>2026-03-04T20:16:10.682Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0242-valid-anagram</loc><lastmod>2026-03-04T06:16:50.464Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0258-add-digits</loc><lastmod>2026-03-23T05:14:57.332Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0263-ugly-number</loc><lastmod>2026-03-23T14:17:09.237Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0268-missing-number</loc><lastmod>2026-03-04T15:06:15.646Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0278-first-bad-version</loc><lastmod>2026-03-25T14:17:19.411Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0283-move-zeroes</loc><lastmod>2026-03-05T06:17:02.347Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0290-word-pattern</loc><lastmod>2026-03-17T05:12:50.451Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0303-range-sum-query-immutable</loc><lastmod>2026-03-05T15:09:59.921Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0338-counting-bits</loc><lastmod>2026-03-16T05:01:32.306Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0344-reverse-string</loc><lastmod>2026-03-05T20:16:21.289Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0345-reverse-vowels-of-a-string</loc><lastmod>2026-03-18T19:06:07.531Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0349-intersection-of-two-arrays</loc><lastmod>2026-03-06T06:17:32.096Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0350-intersection-of-two-arrays-ii</loc><lastmod>2026-03-22T19:09:09.503Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0383-ransom-note</loc><lastmod>2026-03-20T14:17:17.035Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0387-first-unique-character-in-a-string</loc><lastmod>2026-03-06T15:13:24.005Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0389-find-the-difference</loc><lastmod>2026-03-19T19:14:43.237Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0392-is-subsequence</loc><lastmod>2026-03-06T20:16:23.786Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0404-sum-of-left-leaves</loc><lastmod>2026-03-24T14:03:59.497Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0409-longest-palindrome</loc><lastmod>2026-03-21T19:05:39.860Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0412-fizz-buzz</loc><lastmod>2026-03-07T15:15:48.448Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0414-third-maximum-number</loc><lastmod>2026-03-22T05:16:06.291Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0415-add-strings</loc><lastmod>2026-03-25T19:04:35.861Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0448-find-all-numbers-disappeared-in-an-array</loc><lastmod>2026-03-08T06:09:27.249Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0459-repeated-substring-pattern</loc><lastmod>2026-03-26T14:17:43.506Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0461-hamming-distance</loc><lastmod>2026-03-09T14:16:25.021Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0485-max-consecutive-ones</loc><lastmod>2026-03-22T14:11:14.717Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0496-next-greater-element-i</loc><lastmod>2026-03-10T05:16:33.286Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0509-fibonacci-number</loc><lastmod>2026-03-24T05:16:49.711Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0520-detect-capital</loc><lastmod>2026-03-23T19:16:13.836Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0543-diameter-of-binary-tree</loc><lastmod>2026-03-10T14:17:00.369Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0557-reverse-words-in-a-string-iii</loc><lastmod>2026-03-10T19:16:34.299Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0572-subtree-of-another-tree</loc><lastmod>2026-03-11T05:16:30.496Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0605-can-place-flowers</loc><lastmod>2026-03-11T19:08:14.415Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0617-merge-two-binary-trees</loc><lastmod>2026-03-12T05:09:29.683Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0637-average-of-levels-in-binary-tree</loc><lastmod>2026-03-25T05:16:10.155Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0643-maximum-average-subarray-i</loc><lastmod>2026-03-12T14:09:41.927Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0657-robot-return-to-origin</loc><lastmod>2026-03-26T05:07:07.440Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0704-binary-search</loc><lastmod>2026-03-12T19:15:55.852Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0709-to-lower-case</loc><lastmod>2026-03-13T05:15:48.856Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0724-find-pivot-index</loc><lastmod>2026-03-26T19:10:24.125Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0746-min-cost-climbing-stairs</loc><lastmod>2026-03-19T05:11:01.545Z</lastmod></url><url><loc>https://4khil4braham.com/posts/leetcode/leetcode/0876-middle-of-the-linked-list</loc><lastmod>2026-03-20T19:17:05.847Z</lastmod></url><url><loc>https://4khil4braham.com/professional-experience</loc><lastmod>2026-01-09T16:33:02.486Z</lastmod></url><url><loc>https://4khil4braham.com/research</loc><lastmod>2025-07-06T22:19:34.339Z</lastmod></url></urlset>