<?xml version="1.0" encoding="UTF-8" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">

    <url>
                                <loc>https://www.cybernabs.com</loc>
                                <priority>1.00</priority>
                            </url><url> <loc>https://www.cybernabs.com/blog/mh4fwombs3lzzque</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-25-053607-dd3061.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-25-054200-ab31f7.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-25-053824-d6ae1a.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-25-054559-c4a619.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-25-054522-ab31f7.webp</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/vqeyiejgc9n1zosf</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-15-192603-9e4192.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-15-192347-f6387c.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-15-192243-5c063f.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-15-192321-5c063f.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-15-192212-d76d5e.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-15-192347-9e4192.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-15-192414-9e4192.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-03-15-192458-9e4192.webp</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/w8cnjzpnz30oqcbp2</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-02-02-080347-92331c.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-02-02-061627png-92331c.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/3rd-hard-drive-92331c.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-02-02-084145-3b1f87.webp</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/mmkrzfkcciz8jf2h</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/f9b3f3d6-899b-42e7-b37f-8676c6656e0a-bcaed4.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-02-06-115946-f28940.webp</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/zqzicq0qdgrwy5hl</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-02-02-061627png-577b05.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-02-02-080347-713255.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/3rd-hard-drive-5f0980.webp</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-02-02-084145-41e8f6.webp</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/windows-event-logs</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2026-01-22-101804-5c880d.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/project-summit-screenshot-2025-07-28-193337-6b7927.png</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/threat-modeling-project</loc><priority>0.3</priority><image:image><image:loc>https://i.ytimg.com/vi/21Rhnaxe6AU/hqdefault.jpg</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/pyramid-of-pain</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/project-summit-screenshot-2025-07-28-170103-d26f19.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/project-summit-screenshot-2025-07-28-165548-9973ba.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/project-summit-screenshot-2025-07-28-171817-ab7d1b.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/project-summit-screenshot-2025-07-28-172859-797c6f.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/project-summit-screenshot-2025-07-28-193337-6b7927.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/project-summit-screenshot-2025-07-28-194115-4078ba.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/project-summit-screenshot-2025-07-28-195536-8943a7.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/project-summit-screenshot-2025-07-28-202322-8e098a.png</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/-vulnerability-management-with-nessus-and-automated-remediation</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/oip-19-0ddff2.jpg</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/oip-20-720cdc.jpg</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/ms-sentinel-logs-2-a8b6c4.png</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/mcztappnlhifveio</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/oip-19-0ddff2.jpg</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/oip-20-720cdc.jpg</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/ms-sentinel-logs-2-a8b6c4.png</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/network-security-analysis-using-zeek-at-google</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/figure-6-analyzing-a-log-file-590x346-57f920.jpg</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/implementasocandhoneynetlabinazure</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2024-06-21-221328-d74aba.png</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/updateafilethroughapythonalgorithm</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2024-05-05-200702-b5e23f.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2024-05-05-200222-e4a913.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2024-05-05-195314-2efde2.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2024-05-05-190316-7c8066.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2024-05-05-185251-7edef4.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/scope-and-goals-371e48.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/screenshot-2024-05-05-180515-b437f4.png</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/testingoutquerieswithsplunk</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/splunk-tp-8e77f1.png</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/skplei2xnorx5pmk</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/sql-example-of-using-and-or-and-not-operators-03d614.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/sql-picture-1-ee21e5.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/sql-picture-1-bf2019.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/sql-picture-2-721d4c.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/sql-picture-3-c2803e.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/sql-picture-4-66b76a.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/sql-picture-5-a3a3f7.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/sql-picture-6-06a063.png</image:loc></image:image></url><url> <loc>https://www.cybernabs.com/blog/wqkgbh2rmfhznflx</loc><priority>0.3</priority><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/linux-file-premissions-54303c.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/linux-picture-4-12b39b.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/linux-picture-3-92f5bd.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/linux-picture-2-0bfaf1.png</image:loc></image:image><image:image><image:loc>https://dkemhji6i1k0x.cloudfront.net/000_clients/3799470/page/linux-picture-1-1b980a.png</image:loc></image:image></url>
</urlset>