<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://svyat.tech</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>1.0</priority></url><url><loc>https://svyat.tech/1-9-testing-for-weaker-authentication-in-alternative-channel</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/module-sql-injection</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/exiftool-in-linux-windows</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/video-module-broken-access-control</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/module-business-logic-vulnerabilities</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/crack-hash-password-with-john-the-ripper-and-hashcat</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/why-you-shouldnt-use-mac-address-filtering-on-your-wi-fi-router</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/a7what-is-xss</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/metriki-proyektu-ta-procesiv</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/how-to-find-sql-injection-using-sqlmap</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/2-4-testing-for-insecure-direct-object-references</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/3-6-testing-for-logout-functionality</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/cheat-sheet-po-testuvannyu-riznih-funkcionaliv</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/a2broken-authentication-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/video-business-logic-vulnerabilities</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/burp-suite-tool</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/broken-function-level-authorization</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/owasp-api-kiberbezpeka</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/video-module-identification-and-authentication-failure</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/what-is-brute-force-and-how-to-check-for-this-vulnerability</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/3-2-testing-for-cookies-attributes</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/athorize-in-burp-suite</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/osint</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/yak-stvoriti-kolekciyi-dlya-testuvannya-api-bez-dokumentaciyi</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/m4-insecure-authentication-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/how-to-capture-username-and-password-using-ettercap</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/m3-insecure-communication-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/1-authentication-testing</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/security-misconfiguration</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/broken-authentication</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/personal-cyber-security</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/broken-object-property-level-authorization</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/3-4-testing-for-exposed-session-variables</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/3-8-testing-for-session-puzzling</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/4-3-testing-for-http-parameter-pollution</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/podcast-kiberbezpeka</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/web-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/3-7-testing-session-timeout</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/owasp-testing-guide</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/2-3-testing-for-privilege-escalation</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/viyavlennya-sekretiv-i-zapitiv-api-za-dopomogoyu-apkleaks</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/yak-koristuvatisya-netcat</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/pentest-docker</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/2-2-testing-for-bypassing-authorization-schema</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/2-authorization-testing</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/module-broken-access-control</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/video-kurs-sql-injection</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/kiberbezpeka-api-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/testing-for-xss-and-other-vulnerabilities-with-owasp-zap</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/60-atak-na-klaud</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/testing-uploader-for-vulnerabilities</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/m1-improper-platform-usage</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/yak-obijti-perevirku-po-tokenu-csrf</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/m2-insecure-data-storage-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/1-6-testing-for-weak-password-policy</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/definitive-guide-to-passwords</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/8-best-programs-for-network-analysis</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/4-2-testing-for-stored-cross-site-scripting</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/video-kurs-xss</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/pentesting-bazovij-cheklist-dlya-tovstogo-kliyenta</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/vzlom-api-cherez-curl</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/cyber-security-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/burp-extension-cors</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/how-find-xss-with-free-burp-suite</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/a7practice-in-xss</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/1-1-testing-for-credentials-transported-over-an-encrypted-channel</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/3-session-management-testing</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/blog-kiberbezpeka</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/how-analysis-traffic-with-wireshark</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/obrobka-korisnogo-navantazhennya-burp-suite</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/metodologiyi-neetichnogo-hakerstva</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/osint-with-chat-gpt</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/unrestricted-resource-consumption</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/jwt-token-attack</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/foundation-linux-command</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/how-to-find-places-on-web-site-where-cloudflare-doesnt-protect</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/a10insufficient-loggingmonitoring-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/1-3-testing-for-weak-lock-out-mechanism</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/1-2-testing-for-default-credentials</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/cheat-sheet-z-riznimi-danimi-dlya-perevirki-chislovogo-tektovogo-ta-milnogo-polya</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/burp-suite-plugin-hackbar</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/1-4-testing-for-bypassing-authentication-schema</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/msfvenom-cheatsheet</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/3-3-testing-for-session-fixation</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/bypass-cloudflare-in-file-upload</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/nmap-for-pentester</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/cross-site-websocket-hijacking</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/improper-inventory-management</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/5-ssrf-payload</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/broken-object-level-authorization</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/3-1-testing-for-session-management-schema</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/a8insecure-deserialization-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/module-xss</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/efektivne-vikoristannya-cursor-ta-optimizaciya-vitrat-na-ai</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/1-5-testing-for-browser-cache-weaknesses</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/bash-skripti-linux</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/shvidkij-start-penetration-testing</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/a6security-misconfiguration-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/burp-suite-plugin-ip-rotate</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/yak-zahostiti-svij-vebsajt-v-dark-net</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/3-9-testing-for-session-hijacking</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/unrestricted-access-to-sensitive-business-flows</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/4-1-testing-for-reflected-cross-site-scripting</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/cheat-sheet-how-to-test-forgot-password</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/top-phishing-techniques</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/1-8-testing-for-weak-password-change-or-reset-functionalities</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/api-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/1-7-testing-for-weak-security-question-answer</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/2-1-testing-directory-traversal-file-include</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/scanning-web-application-with-burp-suite</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/checking-your-project-for-vulnerability-to-ddos</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/4-input-validation-testing</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/a1injection-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/guide-to-api-hacking</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/3-5-testing-for-cross-site-request-forgery</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/what-is-metasploit-and-what-you-need-to-know-about-it</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/module-identification-and-authentication-failure</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/api-security-quick-audit-checklist</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/server-side-request-forgery</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/a5broken-access-control-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/how-work-with-whatweb</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/mobile-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/burp-suite-turbo-intruder</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/kiberbezpeka-owasp-top-10</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/how-test-dns</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/unsafe-consumption-of-apis</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/basic-malware-analysis</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/testuvannya-bezpeki-dodatkiv-video-kurs</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url><url><loc>https://svyat.tech/security-testing-courses</loc><lastmod>2026-04-06T10:53:04.000Z</lastmod><priority>0.5</priority></url></urlset>