<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://soc-analyst-hub.pages.dev/</loc></url><url><loc>https://soc-analyst-hub.pages.dev/about/</loc></url><url><loc>https://soc-analyst-hub.pages.dev/articles/</loc></url><url><loc>https://soc-analyst-hub.pages.dev/articles/detecting-c2-beaconing-dns-tunneling/</loc></url><url><loc>https://soc-analyst-hub.pages.dev/articles/detecting-lsass-credential-dumping-windows/</loc></url><url><loc>https://soc-analyst-hub.pages.dev/articles/detecting-malicious-powershell-execution/</loc></url><url><loc>https://soc-analyst-hub.pages.dev/articles/hunting-living-off-the-land-binaries-lolbins/</loc></url><url><loc>https://soc-analyst-hub.pages.dev/articles/sigma-rule-writing-guide-beginners/</loc></url><url><loc>https://soc-analyst-hub.pages.dev/articles/threat-hunting-lateral-movement-smb/</loc></url><url><loc>https://soc-analyst-hub.pages.dev/articles/velociraptor-threat-hunting-endpoints/</loc></url></urlset>