<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://sibouzitoun.tech/</loc></url><url><loc>https://sibouzitoun.tech/contact/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/ctrl_cure_ctf/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/ctrl_cure_ctf/amazigh-knew-binary/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/ctrl_cure_ctf/tagrawla/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/ctrl_cure_ctf/weird-doctor/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/darkest_hour_25/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/darkest_hour_25/capturing-the-admin-password-via-dns-spoofing/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/darkest_hour_25/escaping-a-python-network-jail/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/darkest_hour_25/man-in-the-middle-attack/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/darkest_hour_25/wi-fi-cracking/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/darkest_hour_26/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/darkest_hour_26/simpleslider/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/beb-tileni/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/bruteforce-timing/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/fortnine/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/fortnitte-2/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/free-bitcoin/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/ip-fields/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/j3ala-ware/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/notpad/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/random-puzzle/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/serie-algebre/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/friendly_ctf_24/welcome-to-wireshark/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/honeynet_collapse_ctf/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/honeynet_collapse_ctf/elevating-movement/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/honeynet_collapse_ctf/initial-access-pot/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/honeynet_collapse_ctf/shock-and-silence/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/honeynet_collapse_ctf/the-last-trial/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/securinets_finals_25/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/securinets_finals_25/revenge/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/securinets_finals_25/warmup/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/securinets_quals_25/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/securinets_quals_25/easy-jail/</loc></url><url><loc>https://sibouzitoun.tech/ctfs/securinets_quals_25/recovery/</loc></url><url><loc>https://sibouzitoun.tech/labs/</loc></url><url><loc>https://sibouzitoun.tech/labs/advanced-snmp-monitoring-and-security-lab/</loc></url><url><loc>https://sibouzitoun.tech/labs/advanced-snmp-monitoring-and-security-lab/basic-snmp-configuration-on-network-devices/</loc></url><url><loc>https://sibouzitoun.tech/labs/advanced-snmp-monitoring-and-security-lab/conclusion/</loc></url><url><loc>https://sibouzitoun.tech/labs/advanced-snmp-monitoring-and-security-lab/flask-based-snmp-monitoring-web-application/</loc></url><url><loc>https://sibouzitoun.tech/labs/advanced-snmp-monitoring-and-security-lab/introduction-to-snmpv3-and-secure-monitoring/</loc></url><url><loc>https://sibouzitoun.tech/labs/advanced-snmp-monitoring-and-security-lab/lab-environment-setup-using-gns3/</loc></url><url><loc>https://sibouzitoun.tech/labs/advanced-snmp-monitoring-and-security-lab/querying-snmp-from-a-linux-host/</loc></url><url><loc>https://sibouzitoun.tech/labs/advanced-snmp-monitoring-and-security-lab/snmp-exploitation-techniques/</loc></url><url><loc>https://sibouzitoun.tech/labs/cve-2025-8061/</loc></url><url><loc>https://sibouzitoun.tech/labs/cve-2025-8061/bypassing-dse/</loc></url><url><loc>https://sibouzitoun.tech/labs/cve-2025-8061/engineering-a-fully-dynamic-exploit/</loc></url><url><loc>https://sibouzitoun.tech/labs/cve-2025-8061/the-ghost-in-the-machine/</loc></url><url><loc>https://sibouzitoun.tech/labs/cve-2025-8061/weaponizing-byovd-and-privilege-escalation/</loc></url><url><loc>https://sibouzitoun.tech/labs/ftp-security-and-sftp-implementation/</loc></url><url><loc>https://sibouzitoun.tech/labs/ftp-security-and-sftp-implementation/conclusion/</loc></url><url><loc>https://sibouzitoun.tech/labs/ftp-security-and-sftp-implementation/demonstrating-ftp-vulnerabilities/</loc></url><url><loc>https://sibouzitoun.tech/labs/ftp-security-and-sftp-implementation/exploiting-ftp-weaknesses/</loc></url><url><loc>https://sibouzitoun.tech/labs/ftp-security-and-sftp-implementation/securing-file-transfers-with-sftp/</loc></url><url><loc>https://sibouzitoun.tech/labs/ftp-security-and-sftp-implementation/setting-up-ftp/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/conclusion/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/future-directions-and-roadmap/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/implementation-methodology---version-1-reactive/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/implementation-methodology---version-2-audit-and-mitigation/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/installation-and-deployment/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/network-architecture-and-simulation/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/network-security-and-traffic-encryption/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/performance-benchmark-analysis/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/project-overview/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/technologies-and-tools-used/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/testing-and-demonstration/</loc></url><url><loc>https://sibouzitoun.tech/labs/jade-project-for-multi-agents-monitoring/web-application-and-forensics-dashboard/</loc></url><url><loc>https://sibouzitoun.tech/labs/lamp-stack-setup-lab/</loc></url><url><loc>https://sibouzitoun.tech/labs/lamp-stack-setup-lab/enabling-https-on-apache-with-a-self-signed-certificate/</loc></url><url><loc>https://sibouzitoun.tech/labs/lamp-stack-setup-lab/mysql-client-configuration-on-the-php-server/</loc></url><url><loc>https://sibouzitoun.tech/labs/lamp-stack-setup-lab/setting-up-ssl-for-mysql-communication/</loc></url><url><loc>https://sibouzitoun.tech/labs/lamp-stack-setup-lab/setting-up-the-apache-web-server/</loc></url><url><loc>https://sibouzitoun.tech/labs/lamp-stack-setup-lab/setting-up-the-mysql-database-server/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab1/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab3/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab5/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab6/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab7/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab9/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab10/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab11/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab12/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab13/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab14/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab15/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab16/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab17/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab18/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab19/</loc></url><url><loc>https://sibouzitoun.tech/labs/practical-malware-analysis/lab20/</loc></url><url><loc>https://sibouzitoun.tech/labs/ssh-brute-force-analysis-and-mitigation/</loc></url><url><loc>https://sibouzitoun.tech/labs/ssh-brute-force-analysis-and-mitigation/brute-force-attack-simulation-using-hydra/</loc></url><url><loc>https://sibouzitoun.tech/labs/ssh-brute-force-analysis-and-mitigation/conclusion/</loc></url><url><loc>https://sibouzitoun.tech/labs/ssh-brute-force-analysis-and-mitigation/environment-setup/</loc></url><url><loc>https://sibouzitoun.tech/labs/ssh-brute-force-analysis-and-mitigation/implementing-brute-force-mitigation-with-fail2ban/</loc></url><url><loc>https://sibouzitoun.tech/labs/ssh-brute-force-analysis-and-mitigation/strengthening-ssh-security-with-key-based-authentication/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/conclusion/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/exploit-summary-table/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/exposed-developer-and-debug-endpoints/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/fake-old-password-verification/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/insecure-direct-object-reference-idor/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/installation-and-troubleshooting/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/login-password-bruteforce/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/otp-bruteforce-vulnerability/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/password-reset-otps/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/pii-in-jwt-tokens/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/sql-injection-sqli/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/users-enumeration/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/weak-jwt-signature/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/web-application-tour/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/web-shell/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/xss-injection/</loc></url><url><loc>https://sibouzitoun.tech/labs/unsafe-bank-pentesting-writeup/xxe/</loc></url><url><loc>https://sibouzitoun.tech/projects/</loc></url></urlset>