<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://attackvector.tech</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://attackvector.tech/scan</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://attackvector.tech/pricing</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://attackvector.tech/how-it-works</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://attackvector.tech/blog</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/the-most-exploited-cves-of-the-last-decade-and-why-they-still-work</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/security-grades-demystified-what-your-a-to-f-rating-actually-means</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/cross-site-scripting-xss-explained-how-hackers-inject-code-into-your-website</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/what-is-cvss-scoring-and-how-to-read-vulnerability-severity-ratings</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/api-security-101-common-vulnerabilities-and-how-to-prevent-them</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/dns-security-how-attackers-exploit-your-domain-configuration</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/what-is-a-penetration-test-and-when-does-your-business-need-one</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/http-security-headers-the-first-line-of-defense-you-are-probably-missing</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/what-is-ssltls-and-how-to-know-if-your-website-is-properly-secured</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/owasp-top-10-explained-the-most-critical-web-application-security-risks</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/what-is-a-cve-and-why-should-every-developer-care</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/why-we-built-attackvector-with-startupgptpro-instead-of-base44-cursor-codex-or-claude-code</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/blog/ai-powered-pentesting-vs-traditional-security-audits-why-startups-and-freelancers-no-longer-need-to-spend-thousands</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/cors-misconfiguration</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/zero-trust-architecture</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/clickjacking</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/container-security</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/reverse-shell</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/security-audit</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/sensitive-data-exposure</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/phishing</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/port-scanning</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/xml-external-entity</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/two-factor-authentication</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/threat-modeling</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/supply-chain-attack</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/social-engineering</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/ransomware</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/password-hashing</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/oauth-vulnerabilities</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/network-segmentation</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/lateral-movement</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/jwt-security</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/incident-response</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/web-application-firewall</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/ddos-attack</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/cryptographic-failures</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/command-injection</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/authentication-bypass</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/firewall</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/stored-xss</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/directory-traversal</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/man-in-the-middle-attack</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/bug-bounty-program</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/privilege-escalation</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/attack-surface</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/security-headers</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/remote-code-execution</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/subdomain-enumeration</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/api-security-testing</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/zero-day-vulnerability</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/dns-reconnaissance</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/owasp-top-10</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/content-security-policy</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/vulnerability-scanning</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/security-misconfiguration</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/server-side-request-forgery</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/cvss-score</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/broken-access-control</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/cross-site-request-forgery</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/penetration-testing</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/tls-misconfiguration</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/reflected-xss</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/idor-detection</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/glossary/sql-injection</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/cves</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>daily</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://attackvector.tech/about</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://attackvector.tech/terms</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://attackvector.tech/privacy</loc>
<lastmod>2026-03-06T13:03:20.376Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
</urlset>
