<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://journal.ishaansrv.com/2026/02/02/the-notepad-supply-chain-hijacking-a-detection-engineers-deep-dive/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2026/02/notepad-software-icon.png</image:loc><image:title>notepad-software-icon</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2026/02/notepad-icon.png</image:loc><image:title>notepad-icon</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2026/02/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivaxmxodq2ns1pbwfnzs1rd3lzohrlcy5qcgc.webp</image:loc><image:title>Yellow Abstract Texture</image:title></image:image><lastmod>2026-02-02T14:07:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/08/11/windows-dll-analysis-a-reverse-engineers-guide-to-legitimate-vs-malicious-api-usage/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/08/windows-dll-api-2.png</image:loc><image:title>windows-dll-api</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/08/windows-dll-api-1.png</image:loc><image:title>windows-dll-api</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/08/windows-dll-api.png</image:loc><image:title>windows-dll-api</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/08/system-dlls.png</image:loc><image:title>system-dlls</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/08/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-11T19:46:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/08/03/toolshell-unleashed-critical-sharepoint-vulnerabilities-expose-company-knowledge-base/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-08-03T16:33:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/08/what-googles-new-smartphone-os-fuchsia/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/tjfj.png</image:loc><image:title>tjfj</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/kyk.jpg</image:loc><image:title>kyk</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/kg.jpg</image:loc><image:title>kg</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/fkhk.jpg</image:loc><image:title>fkhk</image:title></image:image><lastmod>2025-07-30T14:30:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/28/just-nmap-it/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/4461817171_1738ba0616_b.jpg</image:loc><image:title>Clouds off the Aleutian Islands</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/24662369@N07/4461817171" rel="nofollow"&gt;Clouds off the Aleutian Islands&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/24662369@N07" rel="nofollow"&gt;NASA Goddard Photo and Video&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by/2.0/" rel="nofollow"&gt;CC-BY 2.0&lt;/a&gt;</image:caption></image:image><lastmod>2025-07-30T14:30:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/21/all-about-ports-and-networking/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivchgxntk3ndk3lwltywdllwt3dnhzy2hxlmpwzw.jpg</image:loc><image:title>Abstract painting, coloring, modern art</image:title></image:image><lastmod>2025-07-30T14:30:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/08/07/581/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/08/19901190121_364e036930_b.jpg</image:loc><image:title>Expedition 44 Press Conference (201507210027HQ)</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/35067687@N04/19901190121" rel="nofollow"&gt;Expedition 44 Press Conference (201507210027HQ)&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/35067687@N04" rel="nofollow"&gt;NASA HQ PHOTO&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by-nc-nd/2.0/" rel="nofollow"&gt;CC-BY-NC-ND 2.0&lt;/a&gt;</image:caption></image:image><lastmod>2025-07-30T14:30:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/08/08/a-glimpses-on-present-scenario-on-hacking-and-iot-internet-of-things/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/08/4691502462_f774f5343b_b.jpg</image:loc><image:title>France</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/24662369@N07/4691502462" rel="nofollow"&gt;France&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/24662369@N07" rel="nofollow"&gt;NASA Goddard Photo and Video&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by/2.0/" rel="nofollow"&gt;CC-BY 2.0&lt;/a&gt;</image:caption></image:image><lastmod>2025-07-30T14:30:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2018/02/23/cyber-update-23-02-18/</loc><lastmod>2025-07-30T14:30:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/30/resurrection-of-hacking/</loc><lastmod>2025-07-30T14:30:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2018/02/28/cyber-update-01-0318/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2018/02/chjpdmf0zs9sci9pbwfnzxmvd2vic2l0zs8ymdiyltexl2zsmzm0mtg5odexndqtaw1hz2uuanbn.jpg</image:loc><image:title>U.S. Coast Guard Chief Warrant</image:title><image:caption>&lt;a href="https://www.rawpixel.com/image/8738861/photo-image-public-domain-technology-computer" rel="nofollow"&gt;U.S. Coast Guard Chief Warrant&lt;/a&gt; by &lt;a href="" rel="nofollow"&gt;U.S. Forest Service (source)&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/publicdomain/zero/1.0/" rel="nofollow"&gt;CC-CC0 1.0&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2018/02/dae3b-ios-iboot-source-code.png</image:loc><image:title>dae3b-ios-iboot-source-code</image:title></image:image><lastmod>2025-07-30T14:30:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2021/08/11/anatomy-of-attack-exchange-breach-feb21/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2021/08/chjpdmf0zs9sci9pbwfnzxmvd2vic2l0zs8ymdiylta5lzm3odiwmtbkawdfbziuanbn.jpg</image:loc><image:title>Our Army Attacks the Chinese</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2021/08/4438522158_a6284ba7d6_b.jpg</image:loc><image:title>The Rocky Mountain Trench</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/24662369@N07/4438522158" rel="nofollow"&gt;The Rocky Mountain Trench&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/24662369@N07" rel="nofollow"&gt;NASA Goddard Photo and Video&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by/2.0/" rel="nofollow"&gt;CC-BY 2.0&lt;/a&gt;</image:caption></image:image><lastmod>2025-07-30T14:30:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2018/02/28/certifications-v-s-workex-the-indian-scenairio/</loc><lastmod>2025-07-30T14:30:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/03/30/threat-hunting-core/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/03/threat-hunting.png</image:loc><image:title>threat-hunting</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/03/threat.png</image:loc><image:title>threat</image:title></image:image><lastmod>2025-07-30T14:30:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/05/23/hex-appeal-part-1-unraveling-the-art-of-malware-analysis/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/05/pexels-photo.jpg</image:loc><image:title>blue whirl illustration</image:title><image:caption>Photo by asim alnamat on &lt;a href="https://www.pexels.com/photo/blue-whirl-illustration-32997/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/05/malware-analysis.png</image:loc><image:title>malware-analysis</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/05/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/05/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-30T14:30:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2024/06/09/more-about-detection-engineering-its-differences-with-threat-hunting/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2024/06/pexels-photo-315938.jpeg</image:loc><image:title>light trails on highway at night</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/light-trails-on-highway-at-night-315938/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2024/06/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2024/06/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2024/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-30T14:30:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/07/24/binary-formats-pe-and-elf-explained-a-detailed-look-at-how-programs-are-organized-and-loaded/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/binary-formats-pe-and-elf-explained-a-detailed-look.png</image:loc><image:title>binary-formats-pe-and-elf-explained-a-detailed-look</image:title></image:image><lastmod>2025-07-30T14:30:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/07/24/introduction-to-x86-assembly-for-reverse-engineering/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/introduction-to-x86-assembly-for-reverse-engineering.png</image:loc><image:title>introduction-to-x86-assembly-for-reverse-engineering</image:title></image:image><lastmod>2025-07-30T14:30:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/07/05/static-code-analysis/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/code-analysis-2.png</image:loc><image:title>code-analysis</image:title></image:image><lastmod>2025-07-30T14:30:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/07/24/dynamic-analysis-techniques-a-reverse-engineers-field-guide/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/dynamic-analysis-techniques-a-reverse-engineers-field-guide-1.png</image:loc><image:title>dynamic-analysis-techniques-a-reverse-engineers-field-guide</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/pexels-photo-1874636.jpeg</image:loc><image:title>gray concrete building</image:title><image:caption>Photo by Anthony Macajone on &lt;a href="https://www.pexels.com/photo/gray-concrete-building-1874636/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-07-30T14:30:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/07/24/code-injection-binary-modification-altering-execution-flow-and-content-of-binaries-a-reverse-engineers-guide/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/code-injection-binary-modification-altering-execution-flow-and-content-1.png</image:loc><image:title>code-injection-binary-modification-altering-execution-flow-and-content</image:title></image:image><lastmod>2025-07-30T14:30:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/07/24/applying-data-science-to-malware-detection-building-automated-detectors-and-analyzing-large-malware-datasets-a-reverse-engineers-guide/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-30T14:30:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/03/30/introducing-you-to-threat-hunting/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/03/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/03/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/03/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/03/investigating-cyber-threats.png</image:loc><image:title>investigating-cyber-threats</image:title></image:image><lastmod>2025-07-30T14:20:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/07/28/disk-forensics-a-comprehensive-technical-guide/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/disk-forensics-cybersecurity.png</image:loc><image:title>disk-forensics-cybersecurity</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/image-9.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-28T13:14:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/07/28/advanced-memory-forensics-a-cross-platform-technical-guide/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/image-8.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-28T13:02:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/07/28/password-attacks-and-unpacking-from-compromise-to-deep-reverse-engineering-a-cybersecurity-guide/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/image-7.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-28T12:35:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2025/07/28/unveiling-malware-patterns-network-analysis-shared-code-for-reverse-engineers/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/malware-network-analysis-shared-code-detection-unveiling-relationships-and.png</image:loc><image:title>malware-network-analysis-shared-code-detection-unveiling-relationships-and</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2025/07/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-07-28T10:39:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2024/05/29/detection-engineering/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2023/06/pexels-photo-2559484.jpeg</image:loc><image:title>white cumulus clouds</image:title><image:caption>Photo by Stacey Koenitz  R on &lt;a href="https://www.pexels.com/photo/white-cumulus-clouds-2559484/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-05-29T17:38:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2023/06/20/learning-techniques-and-develop-strategy-from-walkthroughs-and-capture-the-flag-challenges-write-ups/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2023/06/post.jpg</image:loc><image:title>post</image:title></image:image><lastmod>2023-06-20T17:45:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2023/06/20/build-robust-microsoft-active-directory/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2023/06/pexels-photo-831084.jpeg</image:loc><image:title>photography of whale tail on water surface</image:title><image:caption>Photo by Rudolf Kirchner on &lt;a href="https://www.pexels.com/photo/photography-of-whale-tail-on-water-surface-831084/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-20T17:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2023/06/18/eu-urges-member-states-to-cut-off-huawei-and-zte-in-5g-networks-immediately/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2023/06/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvd2s3nze2ntqwms1pbwfnzs1rcdziedq0ci5qcgc.jpg</image:loc><image:title>Eu Flag broken</image:title></image:image><lastmod>2023-06-18T18:05:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2023/06/18/detection-engineering-intro-to-threat-hunting/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2023/06/pexels-photo-8369520.jpeg</image:loc><image:title>man in gray long sleeve suit holding a pen</image:title><image:caption>Photo by cottonbro studio on &lt;a href="https://www.pexels.com/photo/man-in-gray-long-sleeve-suit-holding-a-pen-8369520/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2023/06/pexels-photo-7266002.jpeg</image:loc><image:title>close up photo of man holding glass of whiskey</image:title><image:caption>Photo by cottonbro studio on &lt;a href="https://www.pexels.com/photo/close-up-photo-of-man-holding-glass-of-whiskey-7266002/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2023/06/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivzmwxmzkzotmyndi1os1pbwfnzs1rcwfsnhfmyi5qcgc.jpg</image:loc><image:title>Mine detection boom sites_48</image:title><image:caption>&lt;a href="https://www.rawpixel.com/image/3577735/free-photo-image-2015-tec-best-warrior-412th-engineer-tec" rel="nofollow"&gt;Mine detection boom sites_48&lt;/a&gt; by &lt;a href="" rel="nofollow"&gt;U.S. Army&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/publicdomain/zero/1.0/" rel="nofollow"&gt;CC-CC0 1.0&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2023/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-06-18T18:05:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/02/first-blog-post/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/48139665557_50c33726c6_b.jpg</image:loc><image:title>The Volga River flows into the Caspian Sea</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/29988733@N04/48139665557" rel="nofollow"&gt;The Volga River flows into the Caspian Sea&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/29988733@N04" rel="nofollow"&gt;NASA Johnson&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by-nd-nc/2.0/jp/" rel="nofollow"&gt;CC-BY-NC-ND 2.0&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-05T00:29:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/03/day-0/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/chjpdmf0zs9sci9pbwfnzxmvd2vic2l0zs8ymdiyltexl2xyl3ntaxroc25zywftmtk2nzyzmtiyms1pbwfnzs5qcgc.jpg</image:loc><image:title>Abstract by Carl Newman</image:title></image:image><lastmod>2023-06-05T00:28:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/03/day-1/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/8371682954_6b070daa8c_b.jpg</image:loc><image:title>NASA Space Telescopes See Weather Patterns in Brown Dwarf</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/24662369@N07/8371682954" rel="nofollow"&gt;NASA Space Telescopes See Weather Patterns in Brown Dwarf&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/24662369@N07" rel="nofollow"&gt;NASA Goddard Photo and Video&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by/2.0/" rel="nofollow"&gt;CC-BY 2.0&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-05T00:27:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/04/yes-samsung-s8-is-hackable/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivchg1mdu5ny1pbwfnzs1rd3z4bzbwec5qcgc.jpg</image:loc><image:title>Free coffee with electronic devices</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/screenshot_2017-06-04-13-04-58-1683294744.png</image:loc><image:title>Screenshot_2017-06-04-13-04-58-1683294744</image:title></image:image><lastmod>2023-06-05T00:24:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/05/what-is-judy-malwareis-it-new-wannacryis-your-phone-affected-with-it/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivznjzzwn1cml0ev9wcm90zwn0aw9ux2fudglfdmlydxmtaw1hz2uta3liy293zdeuanbn.jpg</image:loc><image:title>Anti virus scurity screen</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/lvmdv.jpg</image:loc><image:title>lvMDV</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/msvk.jpg</image:loc><image:title>msv;k</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/cm-c.jpg</image:loc><image:title>cm C</image:title></image:image><lastmod>2023-06-05T00:21:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/06/recently-moved-into-new-house/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/9422559155_af1bc61b1e_b.jpg</image:loc><image:title>Phytoplankton bloom in the North Atlantic Ocean</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/24662369@N07/9422559155" rel="nofollow"&gt;Phytoplankton bloom in the North Atlantic Ocean&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/24662369@N07" rel="nofollow"&gt;NASA Goddard Photo and Video&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by/2.0/" rel="nofollow"&gt;CC-BY 2.0&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/fhdfhh.png</image:loc><image:title>fhdfhh</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/sacsac.jpg</image:loc><image:title>sacsac</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/bdh.jpg</image:loc><image:title>bdh</image:title></image:image><lastmod>2023-06-05T00:19:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/06/07/what-is-core-i9-and-x-series-intel-processorswhat-is-better-intel-or-amd/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivbnmxntu3ni1pbwfnzs1rd3z3b2g4ay5qcgc.jpg</image:loc><image:title>Free CPU Processors image</image:title></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/06/i91.png</image:loc><image:title>i9</image:title></image:image><lastmod>2023-06-05T00:16:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/07/02/nobody-likes-reading-a-static-blog-page/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/07/chjpdmf0zs9sci9pbwfnzxmvd2vic2l0zs8ymdiylta1l2zyywjzdhjhy3rfbglnahrfzgfya25lc3nfbglnahrzlwltywdllwt5ymviamdylmpwzw.jpg</image:loc><image:title>Abstract wavy texture black background</image:title></image:image><lastmod>2023-06-04T23:54:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/07/12/kali-an-ocean-of-tools/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/07/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivzmwyotg0mjgymtczmc1pbwfnzs1rcduzbnbnds5qcgc.jpg</image:loc><image:title>The Sandia National Laboratory computer</image:title><image:caption>&lt;a href="https://www.rawpixel.com/image/3325697/free-photo-image-server-linux-technology" rel="nofollow"&gt;The Sandia National Laboratory computer&lt;/a&gt; by &lt;a href="" rel="nofollow"&gt;U.S. Department of Energy&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/publicdomain/zero/1.0/" rel="nofollow"&gt;CC-CC0 1.0&lt;/a&gt;</image:caption></image:image><lastmod>2023-06-04T23:43:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2017/08/08/on-march-717-cia-hacking-tools-revealed-at-wiki-leaks/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2017/08/cia-lobby-seal.jpg</image:loc><image:title>Cia-lobby-seal</image:title></image:image><lastmod>2023-06-04T23:35:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2023/03/03/why-do-the-majority-of-beginners-fail-at-cybersecurity/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2023/03/31730865656_3a09b8fd77_b.jpg</image:loc><image:title>Sunset over the southern part of the Atlantic Ocean</image:title><image:caption>&lt;a href="https://www.flickr.com/photos/29988733@N04/31730865656" rel="nofollow"&gt;Sunset over the southern part of the Atlantic Ocean&lt;/a&gt; by &lt;a href="https://www.flickr.com/photos/29988733@N04" rel="nofollow"&gt;NASA Johnson&lt;/a&gt; is licensed under &lt;a href="https://creativecommons.org/licenses/by-nc-nd/2.0/" rel="nofollow"&gt;CC-BY-NC-ND 2.0&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2023/03/untitled-2-1.png</image:loc><image:title>Untitled 2</image:title></image:image><lastmod>2023-06-04T23:24:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2021/08/11/getting-off-from-restricted-shell-in-linux-penetration-test/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2021/08/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivc3yymty0mdqtaw1hz2uta3d2eddimnmuanbn.jpg</image:loc><image:title>Water texture, abstract, ocean, background</image:title></image:image><lastmod>2023-06-04T23:22:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com/2021/08/11/incident-response-triaging-windows-logs/</loc><image:image><image:loc>https://journal.ishaansrv.com/wp-content/uploads/2021/08/cznmcy1wcml2yxrll3jhd3bpegvsx2ltywdlcy93zwjzaxrlx2nvbnrlbnqvbhivbgl0dgxldmlzdwfsczawmdc1lwltywdllwt3dnllota3lmpwzw.jpg</image:loc><image:title>Black abstract background</image:title></image:image><lastmod>2023-06-04T23:21:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://journal.ishaansrv.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-02-02T14:07:32+00:00</lastmod></url></urlset>
