<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- generated on 2025-10-12 -->

<url>
  <loc>https://haxoris.com/</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>1.00</priority>
</url>

<url>
  <loc>https://haxoris.com/about</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/contact</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/book-now</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cookies</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/privacy-policy</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/references</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/services/penetration-testing</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/services/penetration-testing/applications</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/services/penetration-testing/infrastructure</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/services/penetration-testing/ai-ml-integrations</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/services/penetration-testing/iot</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/services/penetration-testing/cloud</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/services/red-teaming</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/services/social-engineering</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/services/cybersecurity-awareness-training</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/services/vulnerability-assessment</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/services/other-services</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/testing-methodologies/owasp</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/testing-methodologies/wstg</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/testing-methodologies/asvs</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/resources/blog</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/resources/case-studies</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/about-ethical-hacking-with-andrej-seben-podcast</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/how-to-hack-legally-podcast</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/cybersecurity-audit</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/how-we-did-not-get-rich-from-a-scam</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/penetration-testing-of-llm-integrations</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/red-teaming-case-study</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/using-generative-ai-models-to-support-cybersecurity-analysts</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/presenting-owasp-methodologies-at-slovak-technical-university</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/what-is-penetration-testing</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/linkedin-kolotocari-andrej-seben-podcast</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/cve-2026-24061-telnetd-auth-bypass-assumed-breach</loc>
  <lastmod>2026-02-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>1.00</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/o-nas</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/referencie</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/kontakt</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/rezervujte-teraz</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/privacy-policy</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/cookies</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/zdroje/blog</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/zdroje/pripadove-studie</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/metodologie-testovania/asvs</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/metodologie-testovania/owasp</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/metodologie-testovania/wstg</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/penetracne-testy</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/red-teaming</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/socialne-inzinierstvo</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/vulnerability-assessment</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/ostatne-sluzby</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/skolenie-zamestnancov-kyberbezpecnost</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/penetracne-testy/aplikacie</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/penetracne-testy/infrastruktura</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/penetracne-testy/ai-ml-integracie</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/penetracne-testy/iot</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/sluzby/penetracne-testy/cloud</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/audit-kybernetickej-bezpecnosti</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/co-je-penetracne-testovanie</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/ako-legalne-hackovat-podcast</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/o-etickom-hackingu-s-andrejom-sebenom-podcast</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/penetracne-testovanie-llm-integracii</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/prezentacia-owasp-metodik-na-slovenskej-technickej-univerzite</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/pouzivanie-generativnych-ai-modelov-na-podporu-kybernetickych-analytikov</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/red-teaming-case-study</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/linkedin-kolotocari-andrej-seben-podcast</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/takto-sme-nezbohatli-zo-scamu</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/haxoris-na-mobile-app-security-konferencii-2025</loc>
  <lastmod>2025-11-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/sk/clanky/cve-2026-24061-telnetd-obidenie-autentifikacie-assumed-breach</loc>
  <lastmod>2026-02-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>1.00</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/o-nas</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/reference</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/kontakt</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/rezervovat</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/privacy-policy</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/cookies</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/zdroje/blog</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/zdroje/pripadove-studie</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/metodologie-testovani/asvs</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/metodologie-testovani/owasp</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/metodologie-testovani/wstg</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/penetracni-testy</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/red-teaming</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/socialni-inzenyrstvi</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/vulnerability-assessment</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/ostatni-sluzby</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/skoleni-zamestnancu-kyberbezpecnost</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/penetracni-testy/aplikace</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/penetracni-testy/infrastruktura</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/penetracni-testy/ai-ml-integrace</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/penetracni-testy/iot</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/sluzby/penetracni-testy/cloud</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/audit-kyberneticke-bezpecnosti</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/co-je-penetracni-testovani</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/jak-hackovat-legalne-podcast</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/o-etickom-hackingu-s-andrejem-sebenem-podcast</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/penetracni-testovani-llm-integraci</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/prezentace-owasp-metodik-na-slovenske-technicke-univerzite</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/red-teaming-case-study</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/takto-jsme-nezbohatli-ze-scamu</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/haxoris-na-mobile-app-security-konferencii-2025</loc>
  <lastmod>2025-11-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/vyuziti-generativnich-ai-modelu-pro-podporu-kybernetickych-analytiku</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/linkedin-kolotocari-andrej-seben-podcast</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/cz/clanky/cve-2026-24061-telnetd-obejiti-autentizace-assumed-breach</loc>
  <lastmod>2026-02-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/artikel/cve-2026-24061-telnetd-authentifizierungs-umgehung-assumed-breach</loc>
  <lastmod>2026-02-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/files/haxoris-service-portfolio.pdf</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<!-- German (DE) -->

<url>
  <loc>https://haxoris.com/de/</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>1.00</priority>
</url>

<url>
  <loc>https://haxoris.com/de/ueber-uns</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/kontakt</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/jetzt-buchen</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/cookies</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/datenschutz</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/referenzen</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/ressourcen/blog</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/ressourcen/fallstudien</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/testmethoden/owasp</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/testmethoden/wstg</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/testmethoden/asvs</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/penetrationstests</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/penetrationstests/anwendungen</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/penetrationstests/infrastruktur</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/penetrationstests/ai-ml-integrationen</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/penetrationstests/iot</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/penetrationstests/cloud</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/red-teaming</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/social-engineering</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/mitarbeiterschulungen</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/schwachstellenanalyse</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/leistungen/weitere-leistungen</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.80</priority>
</url>

<url>
  <loc>https://haxoris.com/de/artikel/linkedin-kolotocari-andrej-seben-podcast</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/blog-post/haxoris-at-talsec-appsec-conf-2025-red-teaming-mobile-security</loc>
  <lastmod>2025-11-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/de/artikel/haxoris-auf-der-talsec-appsec-conf-2025-red-teaming-mobile-security</loc>
  <lastmod>2025-11-14T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<!-- Haxoris Wiki: Vulnerabilities -->

<url>
  <loc>https://haxoris.com/haxoris-wiki/active-directory</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<!-- Cloud Vulnerabilities: Provider Indexes -->

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/azure/</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/gcp/</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<!-- Active Directory Vulnerabilities -->

<url>
  <loc>https://haxoris.com/haxoris-wiki/active-directory/adcs-esc1</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/active-directory/asrep-roasting</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/active-directory/constrained-delegation</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/active-directory/dcsync-permissions</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/active-directory/kerberoasting</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/active-directory/ntlm-relay</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/active-directory/resource-based-constrained-delegation</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/active-directory/unconstrained-delegation</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/active-directory/weak-password-policies</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<!-- Web OWASP Top 10 Vulnerabilities -->

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10/broken-access-control</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10/cryptographic-failures</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10/identification-and-authentication-failures</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10/injection</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10/insecure-design</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10/security-logging-and-monitoring-failures</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10/security-misconfiguration</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10/software-and-data-integrity-failures</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10/ssrf</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/web-owasp-top-10/vulnerable-and-outdated-components</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<!-- Mobile OWASP Top 10 Vulnerabilities -->

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10/m1-improper-credential-usage</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10/m2-inadequate-supply-chain-security</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10/m3-insecure-authentication-authorization</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10/m4-insufficient-input-output-validation</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10/m5-insecure-communication</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10/m6-inadequate-privacy-controls</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10/m7-insufficient-binary-protections</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10/m8-security-misconfiguration</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10/m9-insecure-data-storage</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/mobile-owasp-top-10/m10-insufficient-cryptography</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<!-- LLM OWASP Top 10 Vulnerabilities -->

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10/excessive-agency</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10/insecure-output-handling</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10/insecure-plugin-design</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10/model-denial-of-service</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10/model-theft</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10/overreliance</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10/prompt-injection</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10/sensitive-information-disclosure</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10/supply-chain-vulnerabilities</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/llm-owasp-top-10/training-data-poisoning</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<!-- Cloud Vulnerabilities: AWS -->

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/cloudtrail-gaps-tampering</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/cross-account-trust-abuse</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/ecr-ecs-misconfigurations</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/iam-privilege-escalation</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/imdsv1-metadata-ssrf</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/lambda-overprivileged-and-secrets</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/open-security-groups</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/public-s3-buckets</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/rds-public-access</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/aws/s3-website-origin-misconfig</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<!-- Cloud Vulnerabilities: Azure -->

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/azure/aad-app-consent-role-abuse</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/azure/blob-public-access</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/azure/function-kudu-exposure</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/azure/key-vault-misconfiguration</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/azure/logging-defender-gaps</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/azure/managed-identity-abuse</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/azure/nsg-misconfigurations</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/azure/rbac-privilege-escalation</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<!-- Cloud Vulnerabilities: GCP -->

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/gcp/audit-logging-retention-gaps</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/gcp/cloud-functions-run-unauthenticated</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/gcp/cloud-sql-public-exposure</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/gcp/gcs-public-buckets</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/gcp/iam-misconfig-lateral-movement</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/gcp/metadata-server-ssrf-default-scopes</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/gcp/service-account-overpriv-keys</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/haxoris-wiki/cloud-vulnerabilities/gcp/vpc-firewall-open-ingress</loc>
  <lastmod>2025-10-12T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

<url>
  <loc>https://haxoris.com/llms.txt</loc>
  <lastmod>2026-02-02T00:00:00+00:00</lastmod>
  <priority>0.64</priority>
</url>

</urlset>
