<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://jobyer.me/tags/appsec/</loc>
    <lastmod>2025-12-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/</loc>
    <lastmod>2025-12-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/tags/cloud/</loc>
    <lastmod>2025-12-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/</loc>
    <lastmod>2025-12-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/how-to-prepare-for-a-pentest-10-steps-to-get-it-right/</loc>
    <lastmod>2025-12-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/tags/pentest/</loc>
    <lastmod>2025-12-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/tags/readiness/</loc>
    <lastmod>2025-12-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/tags/</loc>
    <lastmod>2025-12-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/iso-27001-implementation-for-modern-organizations/</loc>
    <lastmod>2025-12-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/fasttrack-cissp-reference-from-technical-expertise-to-security-leadership/</loc>
    <lastmod>2025-11-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/configure-wake-on-lan-on-mikrotik-and-use-it-from-any-device/</loc>
    <lastmod>2025-10-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/connect-iphone-to-home-lan-with-wireguard-on-mikrotik/</loc>
    <lastmod>2025-10-01T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/stored-xss-in-perfex-crm-3.2.1-contracts-module/</loc>
    <lastmod>2025-03-18T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/stored-xss-in-perfex-crm-3.2.1-project-discussions/</loc>
    <lastmod>2025-03-18T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/privacy/</loc>
    <lastmod>2025-03-05T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/tmux-cheat-sheet/</loc>
    <lastmod>2024-09-21T16:23:12+06:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/why-bangladeshi-businesses-vulnerable-to-cyber-attacks/</loc>
    <lastmod>2024-09-21T16:23:12+06:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/how-about-hiring-a-freelance-cybersecurity-expert/</loc>
    <lastmod>2024-09-20T16:23:12+06:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/start-your-cybersecurity-journey/</loc>
    <lastmod>2024-09-20T16:23:12+06:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/the-story-of-being-only-osce3-from-bangladesh/</loc>
    <lastmod>2024-09-20T16:23:12+06:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/top-5-red-teaming-training-and-certifications/</loc>
    <lastmod>2024-09-20T16:23:12+06:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/%E0%A6%AA%E0%A6%BF%E0%A6%9C%E0%A6%BF%E0%A6%AA%E0%A6%BF-%E0%A6%A6%E0%A6%BF%E0%A7%9F%E0%A7%87-%E0%A6%87%E0%A6%AE%E0%A7%87%E0%A6%87%E0%A6%B2-%E0%A6%93-%E0%A6%A1%E0%A6%BE%E0%A6%9F%E0%A6%BE-%E0%A6%8F%E0%A6%A8%E0%A6%95%E0%A7%8D%E0%A6%B0%E0%A6%BF%E0%A6%AA%E0%A7%8D%E0%A6%9F-%E0%A6%95%E0%A6%B0%E0%A6%BE/</loc>
    <lastmod>2024-09-20T16:23:12+06:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/windows-persistence-cheatsheet/</loc>
    <lastmod>2022-05-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/red-team-tools-collection/</loc>
    <lastmod>2022-05-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/microsoft-excel-payload/</loc>
    <lastmod>2022-03-26T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/poshc2-commands-reference/</loc>
    <lastmod>2022-03-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/active-reconnaissance/</loc>
    <lastmod>2022-03-20T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/open-source-intelligenceosint/</loc>
    <lastmod>2022-03-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/tmux-cheat-sheet/</loc>
    <lastmod>2022-02-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/useful-keyboard-shortcut-in-linux/</loc>
    <lastmod>2022-02-21T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/essential-tools-for-penetration-tester/</loc>
    <lastmod>2022-02-06T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/stack-overflow-egg-huntingvulnserver/</loc>
    <lastmod>2021-11-28T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/seh-stack-buffer-overflow/</loc>
    <lastmod>2021-11-27T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/sql-injection-cheat-sheet/</loc>
    <lastmod>2021-09-09T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/a-quick-cheat-sheet-on-python/</loc>
    <lastmod>2021-08-19T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/web-app-enumeration/</loc>
    <lastmod>2021-01-14T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/web-pentesting-checklist/</loc>
    <lastmod>2021-01-12T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/linux-privilege-escalation/</loc>
    <lastmod>2020-07-11T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/windows-privilege-escalation/</loc>
    <lastmod>2020-07-04T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/blog/penetration-testing-cheatsheet/</loc>
    <lastmod>2020-07-02T00:00:00+00:00</lastmod>
  </url><url>
    <loc>https://jobyer.me/about/</loc>
  </url><url>
    <loc>https://jobyer.me/app-cloud-security-review/</loc>
  </url><url>
    <loc>https://jobyer.me/blog/bash-script-cheat-sheet/</loc>
  </url><url>
    <loc>https://jobyer.me/tags/blockchain-security/</loc>
  </url><url>
    <loc>https://jobyer.me/posts/</loc>
  </url><url>
    <loc>https://jobyer.me/compliance-readiness/</loc>
  </url><url>
    <loc>https://jobyer.me/contact/</loc>
  </url><url>
    <loc>https://jobyer.me/blog/custom-malware-in-c-/</loc>
  </url><url>
    <loc>https://jobyer.me/tags/cybersecurity/</loc>
  </url><url>
    <loc>https://jobyer.me/blog/hashcat-cheat-sheet/</loc>
  </url><url>
    <loc>https://jobyer.me/iso-27001/</loc>
  </url><url>
    <loc>https://jobyer.me/iso-27001/readiness-checklist/</loc>
  </url><url>
    <loc>https://jobyer.me/blog/microsoft-word-macro-payload/</loc>
  </url><url>
    <loc>https://jobyer.me/blog/msdt-follina-exploit-for-initial-access/</loc>
  </url><url>
    <loc>https://jobyer.me/blog/penetration-testing-learning-path/</loc>
  </url><url>
    <loc>https://jobyer.me/penetration-testing/</loc>
  </url><url>
    <loc>https://jobyer.me/blog/pentesting-web-auth/</loc>
  </url><url>
    <loc>https://jobyer.me/rapid-vulnerability-assessment/</loc>
  </url><url>
    <loc>https://jobyer.me/research/</loc>
  </url><url>
    <loc>https://jobyer.me/risk-assessment/</loc>
  </url><url>
    <loc>https://jobyer.me/secure-cloud-setup-review/</loc>
  </url><url>
    <loc>https://jobyer.me/tags/secure-design/</loc>
  </url><url>
    <loc>https://jobyer.me/secure-email-configuration/</loc>
  </url><url>
    <loc>https://jobyer.me/security-hardening/</loc>
  </url><url>
    <loc>https://jobyer.me/blog/server-side-input-validation-testing/</loc>
  </url><url>
    <loc>https://jobyer.me/verification/</loc>
  </url><url>
    <loc>https://jobyer.me/tags/web-security/</loc>
  </url><url>
    <loc>https://jobyer.me/wordpress-saas-hardening/</loc>
  </url>
</urlset>
