<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://blog.nadimjsaliby.com/</loc></url><url><loc>https://blog.nadimjsaliby.com/category/anti-forensics/1/</loc></url><url><loc>https://blog.nadimjsaliby.com/category/blockchain-&amp;-investigations/1/</loc></url><url><loc>https://blog.nadimjsaliby.com/category/cloud-security/1/</loc></url><url><loc>https://blog.nadimjsaliby.com/category/red-team/1/</loc></url><url><loc>https://blog.nadimjsaliby.com/category/web-security/1/</loc></url><url><loc>https://blog.nadimjsaliby.com/post/art-of-anti-forensics/</loc></url><url><loc>https://blog.nadimjsaliby.com/post/bypass-uac-fodhelper/</loc></url><url><loc>https://blog.nadimjsaliby.com/post/decoding-ethereum-blockchain-investigations/</loc></url><url><loc>https://blog.nadimjsaliby.com/post/wafs-ips-bypass-techniques/</loc></url><url><loc>https://blog.nadimjsaliby.com/post/wazuh-alerts-disappear-after-migration/</loc></url><url><loc>https://blog.nadimjsaliby.com/post/wazuh-k8s-hardening-multi-framework-compliance/</loc></url><url><loc>https://blog.nadimjsaliby.com/post/wazuh-rogue-mcp-shadow-ai-detection/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/anti-forensics/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/blockchain/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/blue%20team/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/bypass/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/cis%20benchmark/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/claude%20code/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/cloud%20security/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/compliance/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/cryptocurrency/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/cursor/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/custom%20decoders/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/custom%20rules/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/detection/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/detection%20engineering/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/devsecops/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/dfir/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/digital%20forensics/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/elasticsearch/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/endpoint%20security/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/ethereum/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/fodhelper/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/forensics/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/helm/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/hipaa/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/investigations/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/ips/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/kubernetes/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/kubernetes%20security/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/llm%20security/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/mcp/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/migration/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/mitre%20att&amp;ck/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/nist%20800-53/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/opensearch/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/osint/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/owasp/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/pci-dss/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/penetration%20testing/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/powershell/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/prevention/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/privilege%20escalation/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/red%20team/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/shadow%20ai/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/siem/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/soc/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/soc2/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/uac/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/waf/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/wazuh/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/web%20security/</loc></url><url><loc>https://blog.nadimjsaliby.com/tags/windows/</loc></url></urlset>