<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://phoenix96.home.blog/2021/11/05/silence-is-golden-close-those-ports-with-sshepherd/</loc><lastmod>2021-11-05T22:50:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2021/06/09/metasploit-tips/</loc><lastmod>2021-06-08T09:04:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2021/05/31/device-hardening/</loc><lastmod>2021-06-08T08:54:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2021/06/08/terms-used-in-the-field-of-hacking/</loc><lastmod>2021-06-08T08:50:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2021/04/23/man-in-the-middle-attack-mitm/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2021/04/mitm.jpeg</image:loc><image:title>Shot from the Back to Hooded Hacker Breaking into Corporate Data Servers from His Underground Hideout. Place Has Dark Atmosphere, Multiple Displays, Cables Everywhere.</image:title><image:caption>Shot from the Back to Hooded Hacker Breaking into Corporate Data Servers from His Underground Hideout. Place Has Dark Atmosphere, Multiple Displays, Cables Everywhere.</image:caption></image:image><lastmod>2021-04-23T05:37:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2021/03/05/get-the-hook-lets-phish/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2021/03/intrusion_kill_chain_-_v2.png</image:loc><image:title>Intrusion_Kill_Chain_-_v2</image:title></image:image><lastmod>2021-03-05T19:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/python-ethical-hacking/</loc><lastmod>2021-03-02T17:19:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://phoenix96.home.blog/tutorials/</loc><lastmod>2021-03-02T17:16:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://phoenix96.home.blog/about/</loc><lastmod>2021-02-26T15:16:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://phoenix96.home.blog/2020/12/18/cyber-security-learning-path/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/12/cs-flow-pic1.jpg</image:loc><image:title>Cyber Security Data Protection Business Technology Privacy concept</image:title><image:caption>Cyber Security Data Protection Business Technology Privacy concept.</image:caption></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/12/cs-flow-ipic.jpg</image:loc><image:title>CS-flow-ipic</image:title></image:image><lastmod>2021-02-26T14:46:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/10/01/additional-scanning-tools/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/10/metasploit.png</image:loc><image:title>metasploit</image:title></image:image><lastmod>2020-10-01T06:48:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/09/23/dns-spoofing/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/dns1.jpg</image:loc><image:title>dns1</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/dns.png</image:loc><image:title>dns</image:title></image:image><lastmod>2020-09-23T21:04:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/09/17/packet-sniffer/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/packet-sniff.jpg</image:loc><image:title>packet sniffer concept illustration with laptop comuputer and text banner on screen with flat style and long shadow</image:title><image:caption>packet sniffer concept illustration with laptop comuputer and text banner on screen with flat style and long shadow vector</image:caption></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/sniffer.jpg</image:loc><image:title>sniffer</image:title></image:image><lastmod>2020-09-18T03:50:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/09/11/arp-spoofing/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/arp1.jpg</image:loc><image:title>arp1</image:title></image:image><lastmod>2020-09-11T14:42:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/09/07/network-scanner/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/net_scan.jpg</image:loc><image:title>net_scan</image:title></image:image><lastmod>2020-09-08T03:45:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/09/04/scanning-enumeration-part-2/</loc><lastmod>2020-09-05T02:36:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/09/04/introduction-to-python-programming-and-ethical-hacking/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/mac.jpg</image:loc><image:title>mac</image:title></image:image><lastmod>2025-05-23T07:15:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/09/02/announcement-python-eh/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/img_7340.jpg</image:loc><image:title>img_7340</image:title></image:image><lastmod>2020-09-02T13:59:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/09/02/scanning-enumeration-part-1/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/info.jpg</image:loc><image:title>info</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/scanenu.jpg</image:loc><image:title>scanenu</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/kiop1.png</image:loc><image:title>kiop1</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/09/kiop.png</image:loc><image:title>kiop</image:title></image:image><lastmod>2020-09-02T11:38:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/31/information-gathering-part-2/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/google.png</image:loc><image:title>google</image:title></image:image><lastmod>2020-08-31T05:50:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/28/the-five-stages-of-hacking/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/infogath.jpg</image:loc><image:title>infogath</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/hunter2.png</image:loc><image:title>hunter2</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/hunter1.png</image:loc><image:title>hunter1</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/harvester.png</image:loc><image:title>harvester</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/hunter.png</image:loc><image:title>hunter</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/tesla.png</image:loc><image:title>tesla</image:title></image:image><lastmod>2020-08-28T06:16:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/26/python-part-5/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pyth.jpg</image:loc><image:title>pyth</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pscan9.png</image:loc><image:title>pscan9</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pscan8.png</image:loc><image:title>pscan8</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pscan7.png</image:loc><image:title>pscan7</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pscan6.png</image:loc><image:title>pscan6</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pscan5.png</image:loc><image:title>pscan5</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pscan4.png</image:loc><image:title>pscan4</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pscan3.png</image:loc><image:title>pscan3</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pscan2.png</image:loc><image:title>pscan2</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pscan1.png</image:loc><image:title>pscan1</image:title></image:image><lastmod>2020-08-26T05:55:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/24/python-part-4/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/pp3.jpg</image:loc><image:title>pp3</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/adv8.png</image:loc><image:title>adv8</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/adv7.png</image:loc><image:title>adv7</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/adv6.png</image:loc><image:title>adv6</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/adv5.png</image:loc><image:title>adv5</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/adv4.png</image:loc><image:title>adv4</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/adv3.png</image:loc><image:title>adv3</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/adv2.png</image:loc><image:title>adv2</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/adv1.png</image:loc><image:title>adv1</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/adv.png</image:loc><image:title>adv</image:title></image:image><lastmod>2020-08-24T05:21:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/22/scripting-with-bash/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/bash-1.png</image:loc><image:title>bash</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/bash9.png</image:loc><image:title>bash9</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/bash8.png</image:loc><image:title>bash8</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/bash7.png</image:loc><image:title>bash7</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/bash6.png</image:loc><image:title>bash6</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/bash5.png</image:loc><image:title>bash5</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/bash4.png</image:loc><image:title>bash4</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/bash3.png</image:loc><image:title>bash3</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/bash2.png</image:loc><image:title>bash2</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/bash1.png</image:loc><image:title>bash1</image:title></image:image><lastmod>2020-08-22T15:47:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/03/network-refresher/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/cybe-1.jpg</image:loc><image:title>cybe</image:title></image:image><lastmod>2020-08-22T06:03:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/21/python-part-3/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/python2.jpg</image:loc><image:title>python2</image:title></image:image><lastmod>2020-08-21T05:45:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/19/python-part-2/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/python1.jpg</image:loc><image:title>python1</image:title></image:image><lastmod>2020-08-19T05:20:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/16/python-part-1/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/python.jpg</image:loc><image:title>python</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/maths3.png</image:loc><image:title>maths3</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/maths2.png</image:loc><image:title>maths2</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/maths1.png</image:loc><image:title>maths1</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/maths.png</image:loc><image:title>maths</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/strings7.png</image:loc><image:title>strings7</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/string6.png</image:loc><image:title>string6</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/strings5.png</image:loc><image:title>strings5</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/strings4.png</image:loc><image:title>strings4</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/strings3.png</image:loc><image:title>strings3</image:title></image:image><lastmod>2020-08-19T00:53:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/10/introduction-to-linux/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/kali.jpg</image:loc><image:title>kali</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/kali-1.png</image:loc><image:title>kali</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/perm1.png</image:loc><image:title>perm1</image:title></image:image><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/create.png</image:loc><image:title>create</image:title></image:image><lastmod>2020-08-15T23:35:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/2020/08/12/introduction-to-linux-part-2/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/kali-linux-desktop.png</image:loc><image:title>Kali-Linux-Desktop</image:title></image:image><lastmod>2020-08-15T23:02:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://phoenix96.home.blog/contact/</loc><image:image><image:loc>https://phoenix96.home.blog/wp-content/uploads/2020/08/calm.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2020-08-10T05:15:08+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://phoenix96.home.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-05-23T07:15:42+00:00</lastmod></url></urlset>
