<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url><loc>https://razzify.in/about-us</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/contact-us</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/learn</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/challenges</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/jobs</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/blogs</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/recruitersignup</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/signup</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/login</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/privacy-policy</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/terms-and-conditions</loc><changefreq>monthly</changefreq><priority>0.5</priority></url><url><loc>https://razzify.in/events/1/From Scan to Root: Exploiting Kioptrix Level 1 Step by Step</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://razzify.in/events/2/Kickstart your career in Defensive Security</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://razzify.in/events/3/Hack the Shell:Exploring SSH Attacks with Multiple Tools</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://razzify.in/events/4/Understanding Web &amp; API Vulnerabilities: From Technical Risk to Business Impact</loc><lastmod>2025-12-29</lastmod></url><url><loc>https://razzify.in/events/5/Inside a Real SOC: Live Threat Detection, SIEM Alerts &amp; How to Get Hired as a SOC Analyst</loc><lastmod>2026-01-09</lastmod></url><url><loc>https://razzify.in/events/6/Understanding Governance, Risk, and Compliance (GRC) in Cybersecurity</loc><lastmod>2026-02-17</lastmod></url><url><loc>https://razzify.in/events/7/How To Learn Hacking With CTFs</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://razzify.in/events/8/Hackathon - Cybersecurity Products</loc><lastmod>2026-03-22</lastmod></url><url><loc>https://razzify.in/events/9/Governance, Risk &amp; Compliance in the Digital Era.</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://razzify.in/events/10/Cybersecurity Unlocked, How to Think Like a Hacker</loc><lastmod>2026-03-17</lastmod></url><url><loc>https://razzify.in/events/11/From Zero to Hacker – Offline Ethical Hacking Workshop</loc><lastmod>2026-03-09</lastmod></url><url><loc>https://razzify.in/events/12/The World of Capture The Flag (CTF)</loc><lastmod>2026-03-11</lastmod></url><url><loc>https://razzify.in/events/14/Mastering Network Scanning and Service Enumeration with Nmap</loc><lastmod>2026-03-17</lastmod></url><url><loc>https://razzify.in/events/15/Offensive Web Security: Exploiting Open Redirect, Stored XSS &amp; Google Dorking</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://razzify.in/events/16/Cybersecurity Meetup in Bangalore</loc><lastmod>2026-03-19</lastmod></url><url><loc>https://razzify.in/events/17/Advanced Cyber Defense Program (Tamil)</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/events/18/Live Cyber Attack Demo: See Brute Force &amp; DDoS Attacks Get Detected in Real Time (Using Splunk)</loc><lastmod>2026-03-31</lastmod></url><url><loc>https://razzify.in/events/19/Learn Ethical Hacking in Tamil – Cybersecurity Masterclass 2026</loc><lastmod>2026-04-02</lastmod></url><url><loc>https://razzify.in/course/11</loc><lastmod>2025-04-16</lastmod></url><url><loc>https://razzify.in/blog/1/How to Get Into Cybersecurity Jobs</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/2/Cybersecurity Career Paths: Which Role is Right for You?</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/3/No Experience? No Problem! How to Start a Career in Cybersecurity</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/4/Top 5 Cybersecurity Skills You Need to Get Hired in 2025</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/5/Cyber Threats in 2025: Emerging Risks &amp; How to Stay Safe</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/6/Cybersecurity Myths Debunked: What’s True &amp; What’s Not?</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/7/Cryptographic Hashes Explained: From Basics to Advanced Functions</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/8/Cybersecurity Career Mistakes to Avoid: What Not to Do</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/9/How Cybercriminals Exploit Human Psychology &amp; How to Defend Against It</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/10/AI in Cybersecurity: How Machine Learning is Changing the Game</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/11/Mobile Security in 2025: How to Protect Your Smartphone from Hackers</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/12/Smart Home Security: How to Protect Your IoT Devices</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://razzify.in/blog/17/Basic Pentesting – 1 Walkthrough | Vulnhub</loc><lastmod>2025-05-10</lastmod></url><url><loc>https://razzify.in/blog/18/Basic Pentesting – 2 Walkthrough | Vulnhub</loc><lastmod>2025-05-10</lastmod></url><url><loc>https://razzify.in/blog/19/Windows XP Penetration Testing (MS08-067) – SMB Exploit #1</loc><lastmod>2025-05-10</lastmod></url><url><loc>https://razzify.in/blog/20/Windows 7 Penetration Testing (MS17-010) – EternalBlue SMB Exploit #2</loc><lastmod>2025-05-10</lastmod></url><url><loc>https://razzify.in/blog/21/Basic Pentesting-1 Demonstration | Vulnhub</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/22/Cracking the Code: Secrets of Cryptography, Stegagnography</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/24/Footprinting &amp; Reconnaissance: The First Step in Ethical Hacking</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/25/VulnHub: The Planets : Earth Walkthrough</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/26/VulnHUB:Basic Pentesting 1 Walkthrough</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/27/System Hacking Step By Step Guide of windows 7 Walkthrough</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/28/What is System Hacking &amp;Phases Of System Hacking ? </loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/29/Kioptrix: Level 1 Walkthrough | Vulnhub</loc><lastmod>2025-07-17</lastmod></url><url><loc>https://razzify.in/blog/30/BLUEMOON :2021 | Vulnhub Machine Walkthrough</loc><lastmod>2025-07-17</lastmod></url><url><loc>https://razzify.in/blog/31/HACKSUDO: THOR VulnHub CTF walkthrough</loc><lastmod>2025-07-17</lastmod></url><url><loc>https://razzify.in/blog/32/Basic Linux Commands For Beginnner;-Cheet Sheet</loc><lastmod>2025-07-17</lastmod></url><url><loc>https://razzify.in/blog/33/How to Crack Password Hashes with Hashcat — a Practical Guide</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/34/OWASP Top 10 Vulnerabilities &amp; How to Prevent Them-In 2024</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/35/SQLMAP Tutorial: Complete Guide to SQL Injection Testing for Beginners</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/36/Linux Command Line Tips and Tricks: From Beginner to Advanced</loc><lastmod>2025-07-17</lastmod></url><url><loc>https://razzify.in/blog/37/Getting Started as a SOC Analyst: My Journey into Cybersecurity</loc><lastmod>2025-05-14</lastmod></url><url><loc>https://razzify.in/blog/38/Basic Penetration Testing -1 [ Vulnhub ]</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/41/pyramid of pain</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/42/Beginner’s Guide to Installing and Keeping Kali Linux Up-to-Date</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/43/TCP/IP</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/44/Transmission Control Protocol (TCP)</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/45/Pyramid Of Pain : TryHackMe Walkthrough</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/46/Basic Pentesting-1 Walkthrough | vulnhub</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/47/Beginner’s Guide to Responsive Web Design</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/48/Basic Pentesting -1 Walkthrough | Vulnhub</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/49/Basic Pentesting: 1 Walkthrough | Vulnhub</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/50/The Dark Web: What It Is and How It Fuels Cybercrime</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/51/Basic Pentesting -1 Walkthrough | Vulnhub</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/52/Basic Pentesting -1 Walkthrough</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/53/Installation of Kali Linux in Virtual Box </loc><lastmod>2025-05-15</lastmod></url><url><loc>https://razzify.in/blog/54/Linux File Permissions – A Beginner-Friendly Guide with Examples</loc><lastmod>2025-07-17</lastmod></url><url><loc>https://razzify.in/blog/55/How HttpOnly and Secure Flags Help Prevent Session Hijacking and Session Fixation</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/56/Mitm6 + NTLMRelayX to LDAP</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/57/KERBEROASTING IN ACTIVE DIRECTORY</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/58/Cross-Site Scripting (XSS)</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/59/AS-REP Roasting In Active Directory</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/60/Abusing SUDO: Recipe for Root Access</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/61/“Unraveling the Potato Attacks: How NTLM Exploits Lead to Windows Privilege Escalation”</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/62/Understanding SUID Binaries in Linux: What They Are and How They Work</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/63/“The PATH Variable in Linux: A Clear and Simple Explanation”</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/64/🔐 Authentication and Registration Security Testing — A Bug Bounty Checklist</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/67/🌐 From 12th Dropout to Ethical Hacker | My Cybersecurity Journey 🚀</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/68/Why Cybersecurity Is More Important Than Ever in 2025</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/69/Basic Pentesting – 1 Walkthrough | Vulnhub</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/70/Basic Pentesting – 2 Walkthrough | Vulnhub</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/71/Windows XP Penetration Testing (MS08-067) – SMB Exploit #1</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/72/Windows 7 Penetration Testing (MS17-010) – EternalBlue SMB Exploit #2</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/73/Kioptrix Level – 1 Walkthrough | Vulnhub</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/76/LLMNR/NBT-NS Poisoning</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/77/The Sudoers File: Giving Special Powers in Linux</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/78/What Are Cron Jobs?How Cron Jobs are Stored in the Crontab File: A Basic Example</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/79/Understanding ARP (Address Resolution Protocol): How It Works and Its Role in Networking</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/80/OData Query Injection: Detection, Exploitation, and Mitigation Guide</loc><lastmod>2025-05-18</lastmod></url><url><loc>https://razzify.in/blog/82/What Is Port Knocking?</loc><lastmod>2025-05-20</lastmod></url><url><loc>https://razzify.in/blog/84/Junior Associate</loc><lastmod>2025-05-20</lastmod></url><url><loc>https://razzify.in/blog/85/A Beginner&#x27;s Guide to Classic Ciphers in Cybersecurity Challenges</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://razzify.in/blog/86/Exploring 13 Unique Cipher Techniques</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://razzify.in/blog/90/HTML: The Foundation of the Web Explained in Depth</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://razzify.in/blog/94/The Coffee Shop Hacker: A Lesson in Public Wi-Fi</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://razzify.in/blog/95/CSS: Styling the Web with Power and Precision</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://razzify.in/blog/96/Bootstrap 5: Build Responsive Websites Faster and Smarter</loc><lastmod>2025-05-21</lastmod></url><url><loc>https://razzify.in/blog/97/Part 1: Building Horizon College – Vision, Tools, and Key Features</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://razzify.in/blog/98/Part 2: Horizon College – Design Thinking &amp; Visual Structure</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://razzify.in/blog/99/How My Friend Got Phished — And Didn’t Even Know It</loc><lastmod>2025-05-23</lastmod></url><url><loc>https://razzify.in/blog/100/Phases of Hacking</loc><lastmod>2025-05-23</lastmod></url><url><loc>https://razzify.in/blog/101/5 Phases Of Hacking</loc><lastmod>2025-05-23</lastmod></url><url><loc>https://razzify.in/blog/102/My First Day Using the Hacker’s Toolkit: Kali Linux</loc><lastmod>2025-05-26</lastmod></url><url><loc>https://razzify.in/blog/103/Understanding Pass-the-Hash (PtH) Attacks: A Sneaky Security Threat You Need to Know! 🔐</loc><lastmod>2025-06-02</lastmod></url><url><loc>https://razzify.in/blog/104/🚨 Understanding Overpass-the-Hash Attacks: A Stealthy Lateral Movement Technique 🚨</loc><lastmod>2025-06-02</lastmod></url><url><loc>https://razzify.in/blog/105/🌟 CVE-2025-29927: A Critical Vulnerability in Next.js Middleware 🌟</loc><lastmod>2025-06-02</lastmod></url><url><loc>https://razzify.in/blog/106/Kioptrix 1: Walkthrough | VulnHub</loc><lastmod>2025-06-02</lastmod></url><url><loc>https://razzify.in/blog/109/Cipher Techniques: Encryption and Decryption in Cybersecurity</loc><lastmod>2025-06-21</lastmod></url><url><loc>https://razzify.in/blog/110/INTRODUCTION ON CRYPTOGRAPHY</loc><lastmod>2025-07-11</lastmod></url><url><loc>https://razzify.in/blog/111/Brief on Symmetric-Key cryptography</loc><lastmod>2025-07-14</lastmod></url><url><loc>https://razzify.in/blog/112/Cryptography </loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/113/Basic Linux Commands for Beginners</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/114/10 Basic commands in linux</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/115/24 Essential Linux Commands: Beginner Level</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/116/Basic Kali Linux Commands</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/118/Basic commands of linux for beginners </loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/120/Basic Linux Commands</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/121/linux command</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/122/Essential Linux Commands To Know</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/123/Starting out with Basic Linux commands</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/124/A Simple Guide to Basic Linux Commands</loc><lastmod>2025-07-18</lastmod></url><url><loc>https://razzify.in/blog/125/Basics of Linux Fundamentals and Commands </loc><lastmod>2025-07-28</lastmod></url><url><loc>https://razzify.in/blog/126/Basics of Computer Networking</loc><lastmod>2025-07-19</lastmod></url><url><loc>https://razzify.in/blog/127/Understanding Linux File Permissions</loc><lastmod>2025-07-19</lastmod></url><url><loc>https://razzify.in/blog/128/Linux Package Management a  Beginner’s Guide</loc><lastmod>2025-07-19</lastmod></url><url><loc>https://razzify.in/blog/129/A Walk Through the Linux Directory Structure 🗂️</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/130/Getting Started with Computer Networking</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/131/A Beginner’s Start to Linux Package Management</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/132/Computer Networking Basics</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/133/What lies directly under the root directory?</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/134/Basics of Computer Networking</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/135/Linux Fundamentals and Linux Commands</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/136/A different approach towards understanding Package Managers</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/137/Understanding Computer Networks : That Connects The World</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/138/Linux Package Management</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/139/Linux File Permissions: A Beginner&#x27;s Guide</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/140/Mastering Linux Package Management</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/141/Linux Directory Structure: Explained for Beginners </loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/142/Linux File Permissions</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/143/Linux Package Manager</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/144/Linux File Permissions Guide: Read, Write, Execute </loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/145/Linux Package Management</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/146/Linux Directory structure</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/147/Computer Networking 101</loc><lastmod>2025-07-20</lastmod></url><url><loc>https://razzify.in/blog/148/Linux Permissions Simplified</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/149/ Exploring the Linux Directory Structure</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/150/Linux Package Management</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/151/How Linux controls unauthorized access on it&#x27;s system - Permissions</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/152/  Linux File Permissions Explained</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/153/Computer Networking Essentials </loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/154/Linux Directory Structure</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/155/Linux Directory Structure</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/156/Linux File Permissions</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/157/A Journey into the World of Computer Networking</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/162/Linux Directory Structure</loc><lastmod>2025-07-21</lastmod></url><url><loc>https://razzify.in/blog/163/A brief on Computer Networking</loc><lastmod>2025-07-22</lastmod></url><url><loc>https://razzify.in/blog/164/Linux commands for beginners</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/165/Computer networking</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/166/Steganography and Cryptography</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/167/Hiding in Plain Sight: The Secret Art of Steganography</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/168/Say It in Secret: A Beginner’s Guide to Cryptography</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/169/Secrets, Scrambles &amp; Ciphers: Welcome to Cryptography🕵️‍♂️</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/170/Cryptography A beginners guide</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/171/Introduction to Cryptography</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/172/  Cryptography and Steganography</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/173/Basics of Steganography</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/174/Cryptography and Steganography</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/175/Practical about Steganography - Steghide tool</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/176/An example of Cryptography in our Daily lives</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/177/Beginner’s Guide to Steganography: Hide Data Like a Pro</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/178/Basics Of Computer Networking</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/179/Cryptography</loc><lastmod>2025-07-23</lastmod></url><url><loc>https://razzify.in/blog/180/Cryptography and Steganography</loc><lastmod>2025-08-12</lastmod></url><url><loc>https://razzify.in/blog/181/wifi hacking using wifite</loc><lastmod>2025-11-14</lastmod></url><url><loc>https://razzify.in/blog/182/Linux file permissions</loc><lastmod>2025-07-25</lastmod></url><url><loc>https://razzify.in/blog/183/Linux directory structure </loc><lastmod>2025-07-25</lastmod></url><url><loc>https://razzify.in/blog/184/Steganography for Beginners</loc><lastmod>2025-07-25</lastmod></url><url><loc>https://razzify.in/blog/185/Wifi Hacking</loc><lastmod>2025-07-25</lastmod></url><url><loc>https://razzify.in/blog/186/Wi-Fi Hacking Made Simple with Wifite</loc><lastmod>2025-07-25</lastmod></url><url><loc>https://razzify.in/blog/187/Google Dorking</loc><lastmod>2025-07-25</lastmod></url><url><loc>https://razzify.in/blog/188/Linux Package Management: The Backbone of System Software Control</loc><lastmod>2025-07-27</lastmod></url><url><loc>https://razzify.in/blog/189/Linux File Permissions</loc><lastmod>2025-07-27</lastmod></url><url><loc>https://razzify.in/blog/190/Linux Directory Structure</loc><lastmod>2025-07-27</lastmod></url><url><loc>https://razzify.in/blog/191/Cryptography</loc><lastmod>2025-07-27</lastmod></url><url><loc>https://razzify.in/blog/192/Understanding Wi-Fi Hacking for Enhanced Security</loc><lastmod>2025-07-27</lastmod></url><url><loc>https://razzify.in/blog/193/Google Dorking</loc><lastmod>2025-07-27</lastmod></url><url><loc>https://razzify.in/blog/194/Linux Package made simple</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/195/Linux Directory Structures</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/196/Stegnography Made simple</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/197/Windows XP Penetration Testing And Exploiting.</loc><lastmod>2025-08-03</lastmod></url><url><loc>https://razzify.in/blog/198/⁠Linux File Permissions</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/199/Linux Directory Structure</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/200/Computer Networking </loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/201/Linux Fundamentals and Linux Commands Cheat Sheet</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/202/Linux Package Managament</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/203/Cryptography </loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/204/Steganography</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/205/Google Dorking</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/206/Exploiting a windows TryHackMe machine (Blue)</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/207/Google Dorking 101: The Art of Finding What Others Can’t</loc><lastmod>2025-07-29</lastmod></url><url><loc>https://razzify.in/blog/208/Wi-Fi Hacking With Wifite</loc><lastmod>2025-07-30</lastmod></url><url><loc>https://razzify.in/blog/209/Google Dorking: The Search Engine’s Dark Side (And How to Stay Safe)</loc><lastmod>2025-08-01</lastmod></url><url><loc>https://razzify.in/blog/211/Linux Fundamentals and Commands</loc><lastmod>2025-08-04</lastmod></url><url><loc>https://razzify.in/blog/212/Linux Package Management</loc><lastmod>2025-08-04</lastmod></url><url><loc>https://razzify.in/blog/213/Linux File Permissions</loc><lastmod>2025-08-04</lastmod></url><url><loc>https://razzify.in/blog/214/Linux Directory Structures</loc><lastmod>2025-08-04</lastmod></url><url><loc>https://razzify.in/blog/215/How NOT to hack your Neighbour&#x27;s Wifi - A guide to wifi hacking</loc><lastmod>2025-08-04</lastmod></url><url><loc>https://razzify.in/blog/216/Demystifying cryptography : The science Behind Digital Security</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/218/System Exploitation: Windows 7 with EternalBlue</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/219/ System Penetration Testing: A Human-Centric Dive into Digital Defense</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/220/Block INTERNET ACCESS to specific APPLICATIONs</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/222/How to Block Google Chrome with Windows Defender Firewall</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/223/A Guide to Block Google Chrome from Internet Access</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/225/Blocking Google Chrome via Windows Firewall</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/226/Block Google Chrome from accessing Internet Using Windows Firewall</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/228/Google Dorking </loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/229/ Google Chrome via Windows Firewall</loc><lastmod>2025-08-10</lastmod></url><url><loc>https://razzify.in/blog/230/How to Block a Specific Browser on Your System Using Windows Defender Firewall</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/232/Blocking an application using firewall</loc><lastmod>2025-08-05</lastmod></url><url><loc>https://razzify.in/blog/233/Beyond the Block: The Real Purpose of Using Windows Defender Firewall with Advanced Settings</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/234/Web Attack Investigation via Log Analysis — Recon, Directory Busting, Brute Force &amp; Code Injection</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/235/Blocking google chrome via Windows Firewall</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/236/System Penetration Testing Using Windows XP in VirtualBox</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/240/WIFE HACKING USING WIFITE</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/241/Linux Package Management</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/242/Easy Steps to Perform Basic Log Analysis in Linux</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/244/Walkthrough to block chrome browser from accessing internet by using Microsoft defender firewall</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/245/Blocking Network Access of Google Chrome</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/246/Guide to System Penetration Testing: Exploiting Windows XP with MS08-067</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/247/Block Google Chrome&#x27;s internet access only Other browsers like Edge, Firefox should continue working</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/248/System pentesting on windows 7</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/249/⁠System pentesting on widows XP</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/250/Vulnhub challenge:basic pentesting 1</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/251/Getting Started with Log Analysis</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/252/Steps to Prevent Google Chrome from Accessing the Web</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/253/COMPUTER NETWORKING</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/254/Linux Fundamentals and Linux Commands Cheat Sheet</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/255/Linux Package Management </loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/256/Linux File Permissions</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/257/Why Google it when you can Google Dork it</loc><lastmod>2025-08-06</lastmod></url><url><loc>https://razzify.in/blog/258/How to Block Network Access for Google Chrome on Windows </loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/259/ Linux File Permissions</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/260/Linux Directory Structure</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/261/Cryptography</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/262/Steganography</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/263/wifi hacking</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/264/Google Dorking</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/265/System pentesting on windows 7</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/266/System pentesting on widows XP</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/268/Linux Directory Structure</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/269/Ports in Networking</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/270/Google Dorking</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/271/port</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/272/A Brief Introduction to Log Analysis</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/273/Penetration Testing Windows 7</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/274/Vulnhub challenge:basic pentesting 1</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/275/The Windows Registry: A Central Pillar of the Windows Operating System</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/276/Windows Event Viewer: A Window into System Activity</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/277/ Owasp top 10 vulnerabilities with practical demonstrated</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/278/Conquering the VM Beast - My Windows Installation Odyssey</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/279/Inbound and Outbound Rule via windows firewall</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/280/Logs matter, Log assault and code injection</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/281/Windows XP Penetration Testing</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/282/Exploring the Windows Registry with My Touchpad Fix Experience</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/283/Exploiting Weak Authentication in a FinTech Website CTF challenge</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/284/Cracking a Login Page</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/285/Computer Networking</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/286/Cryptography</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/287/Steganography</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/288/Project 1: Authentication Bug Exploited on a FinTech Payment Platform</loc><lastmod>2025-08-13</lastmod></url><url><loc>https://razzify.in/blog/289/WIFI HACKING WITH WIFITE</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://razzify.in/blog/290/Google Dorking</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/291/Identifying a malware with help of windows Logs</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/292/Windows Registry and Event Viewer ID</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/293/Behind the Ports</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/294/Basic Understanding of Windows Registry &amp; Event Viewer</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/295/Essential Log Locations on Linux &amp; Windows (and how to read them fast)</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/296/WiFi Hacking</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/297/Windows Registry</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/298/How I Planned a Pentest on RubyGems — A Researcher&#x27;s Journey</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/299/Brute-Force Approach to Exploiting Weak Authentication in the Razzify CTF Challenge</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/300/Linux package manager</loc><lastmod>2025-08-08</lastmod></url><url><loc>https://razzify.in/blog/301/Cracking the Code: My Experience with a Brute Force Dictionary Attack in a Security Lab</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://razzify.in/blog/302/Exploiting Weak Authentication in a FinTech Website CTF challenge</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://razzify.in/blog/303/Project 2: How to find  Bug Bounty Targets someone starting out in Bug Bounty ??</loc><lastmod>2025-08-13</lastmod></url><url><loc>https://razzify.in/blog/304/Hunting Bugs in GitLab: My Project 2 Journey</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://razzify.in/blog/305/Basic Process to Prevent Brute Force Attacks on a Server</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://razzify.in/blog/306/&quot;Reconnaissance on RubyGems: My Step-by-Step Journey&quot;</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/307/Monitoring and Securing an Environment ( Cyber Security Project)</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://razzify.in/blog/308/Windows Hardening Cybersecurity Project</loc><lastmod>2025-08-09</lastmod></url><url><loc>https://razzify.in/blog/309/How to Restrict Internet Access for Google Chrome in Windows</loc><lastmod>2025-08-10</lastmod></url><url><loc>https://razzify.in/blog/310/WINDOWS REGISTERY</loc><lastmod>2025-08-10</lastmod></url><url><loc>https://razzify.in/blog/311/ Hidden Story of Your PC (log analysis in windows)</loc><lastmod>2025-08-10</lastmod></url><url><loc>https://razzify.in/blog/312/BRUTE-FORCE Attack- Prevention</loc><lastmod>2025-08-10</lastmod></url><url><loc>https://razzify.in/blog/313/ Windows Event Viewer</loc><lastmod>2025-08-10</lastmod></url><url><loc>https://razzify.in/blog/314/Choosing the right target for penetration testing from HackerOne</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://razzify.in/blog/315/Understanding the Windows Registry: The Brain of Your PC</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://razzify.in/blog/316/Vulnhub &quot;Basic Pentesting 1&quot;</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://razzify.in/blog/317/Preventing Brute Force Attacks on Your Server (Using Kali)</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://razzify.in/blog/318/Identifying the target and defining the scope</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://razzify.in/blog/319/The OWASP 10 Vulnerabilities with Practical Demonstrated</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://razzify.in/blog/320/Log Analysis in Kali</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://razzify.in/blog/321/GitLab — Project 3 Recon</loc><lastmod>2025-08-11</lastmod></url><url><loc>https://razzify.in/blog/322/Reconnaissance Phase in Penetration Testing: A Hands-On Walkthrough on Dashlane</loc><lastmod>2025-08-12</lastmod></url><url><loc>https://razzify.in/blog/323/Testing for Logic &amp; Dependency Issues in RubyGems — My Practical Approach</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/324/OWASP top 10 vulnerabilities with practical demonstration</loc><lastmod>2025-08-12</lastmod></url><url><loc>https://razzify.in/blog/325/Project 1</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/326/Project 2</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/327/Project 3</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/328/Project 4</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/329/My First Steps into Web Security Basic Attack Methodologies</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/330/Log Analysis: Key to smarter security</loc><lastmod>2025-08-13</lastmod></url><url><loc>https://razzify.in/blog/331/Steps to create a custom dashboard in Wazuh that shows VirusTotal traffic.</loc><lastmod>2025-08-13</lastmod></url><url><loc>https://razzify.in/blog/332/Network id &amp; Broadcast id </loc><lastmod>2025-08-14</lastmod></url><url><loc>https://razzify.in/blog/333/Creating a Dashboard in Wazuh (Using sample integral data)</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/334/ Windows Event Logs, Windows Persistent Technique, and Windows Tools for SOC Analyst</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/335/Mapping Grab.com’s Attack Surface — My Recon Workflow in Kali</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/336/File Integrity Monitoring (FIM) with Wazuh-agent</loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/337/Chaining Vulnerabilities, Logic Flaws &amp; Exotic Bugs </loc><lastmod>2025-08-15</lastmod></url><url><loc>https://razzify.in/blog/338/Computer Networks   -Maruthi P Jangali</loc><lastmod>2025-08-16</lastmod></url><url><loc>https://razzify.in/blog/339/Basic linux Commands       -Maruthi  P Jangali</loc><lastmod>2025-08-16</lastmod></url><url><loc>https://razzify.in/blog/340/Stenography  -Maruthi P Jangali</loc><lastmod>2025-08-16</lastmod></url><url><loc>https://razzify.in/blog/341/Google Dorking -Maruthi P Jangali</loc><lastmod>2025-08-16</lastmod></url><url><loc>https://razzify.in/blog/342/ OWASP’s Top 10 Vulnerabilities  -Maruthi P Jangali</loc><lastmod>2025-08-16</lastmod></url><url><loc>https://razzify.in/blog/343/PORT</loc><lastmod>2025-08-16</lastmod></url><url><loc>https://razzify.in/blog/344/Mastering Linux Package Management: A Beginner-Friendly Guide</loc><lastmod>2025-08-17</lastmod></url><url><loc>https://razzify.in/blog/345/Wi-Fi Hacking Basics: Cracking WEP &amp; WPA/WPA2 with Kali Linux</loc><lastmod>2025-08-17</lastmod></url><url><loc>https://razzify.in/blog/346/Google Dorks: Hacking with Just a Search Bar</loc><lastmod>2025-08-17</lastmod></url><url><loc>https://razzify.in/blog/347/🔐 System Pentesting on Windows 7</loc><lastmod>2025-08-17</lastmod></url><url><loc>https://razzify.in/blog/348/OWASP TOP 10 Security Vulnerability and Remediation</loc><lastmod>2025-08-17</lastmod></url><url><loc>https://razzify.in/blog/349/Pentesting Windows XP: Hacking a Legend of the Past</loc><lastmod>2025-08-17</lastmod></url><url><loc>https://razzify.in/blog/350/VulnHub Challenge: Basic Pentesting 1 Walkthrough</loc><lastmod>2025-08-17</lastmod></url><url><loc>https://razzify.in/blog/351/OWASP Top 10 Vulnerabilities </loc><lastmod>2025-08-17</lastmod></url><url><loc>https://razzify.in/blog/352/System pentesting on windows 7</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://razzify.in/blog/353/System pentesting on windows xp</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://razzify.in/blog/354/OWASP Top 10 Vulnerabilities</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://razzify.in/blog/355/Owasp top 10 vulnerabilities</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://razzify.in/blog/356/Windows 7 EternalBlue Exploit (MS17-010) SMBv1 Exploit</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://razzify.in/blog/357/Windows XP SMBv1 Exploit MS08-067 – Remote Code Execution</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://razzify.in/blog/358/Windows 7 Pen Testing </loc><lastmod>2025-08-18</lastmod></url><url><loc>https://razzify.in/blog/359/VulnHub Basic Pentesting 1 Walkthrough</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://razzify.in/blog/360/System pentesting on widows XP</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://razzify.in/blog/361/System Pentesting on Windows 7</loc><lastmod>2025-08-18</lastmod></url><url><loc>https://razzify.in/blog/362/What is TCP &amp; UDP</loc><lastmod>2025-09-22</lastmod></url><url><loc>https://razzify.in/blog/363/Log Analysis on Kali Linux: A Beginner’s Guide to System Logs and Real-Time Monitoring</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://razzify.in/blog/364/Blocking google chrome via window firewall</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://razzify.in/blog/365/What is OSI Model ?</loc><lastmod>2025-08-20</lastmod></url><url><loc>https://razzify.in/blog/366/WIRESHARK : Malware traffic analysis</loc><lastmod>2025-08-21</lastmod></url><url><loc>https://razzify.in/blog/367/Blocking Google Chrome via Windows Firewall</loc><lastmod>2025-08-21</lastmod></url><url><loc>https://razzify.in/blog/368/A Perfect Antivirus for your Linux System</loc><lastmod>2026-02-02</lastmod></url><url><loc>https://razzify.in/blog/371/Different Categories of Security Concerns in Electric Vehicles (EV)</loc><lastmod>2025-08-22</lastmod></url><url><loc>https://razzify.in/blog/372/COMPUTER NETWORKING </loc><lastmod>2025-08-25</lastmod></url><url><loc>https://razzify.in/blog/373/Computer Networking</loc><lastmod>2025-08-23</lastmod></url><url><loc>https://razzify.in/blog/375/Preventing Brute Force Attacks on Linux and Windows</loc><lastmod>2025-08-24</lastmod></url><url><loc>https://razzify.in/blog/376/How to Create a Custom Dashboard in Wazuh</loc><lastmod>2025-08-24</lastmod></url><url><loc>https://razzify.in/blog/377/Malware Traffic Analysis using Wireshark</loc><lastmod>2025-08-24</lastmod></url><url><loc>https://razzify.in/blog/378/Networking Fundamentals</loc><lastmod>2025-08-24</lastmod></url><url><loc>https://razzify.in/blog/379/Introduction to Networking </loc><lastmod>2025-08-24</lastmod></url><url><loc>https://razzify.in/blog/380/What is Computer Networking ?</loc><lastmod>2025-08-24</lastmod></url><url><loc>https://razzify.in/blog/387/COMPUTER NETWORKING</loc><lastmod>2025-08-25</lastmod></url><url><loc>https://razzify.in/blog/389/Phishing Attacks: Meaning, Types and Mitigations</loc><lastmod>2025-08-25</lastmod></url><url><loc>https://razzify.in/blog/391/Basic Linux Commands</loc><lastmod>2025-08-27</lastmod></url><url><loc>https://razzify.in/blog/392/Linux</loc><lastmod>2025-08-27</lastmod></url><url><loc>https://razzify.in/blog/393/BASIC LINUX FUNDAMENTALS AND COMMANDS </loc><lastmod>2025-09-17</lastmod></url><url><loc>https://razzify.in/blog/394/LINUX FUNDAMENTALS AND BASIC COMMANDS</loc><lastmod>2025-08-28</lastmod></url><url><loc>https://razzify.in/blog/395/Getting Started with Linux</loc><lastmod>2025-08-28</lastmod></url><url><loc>https://razzify.in/blog/396/Linux Fundamentals and Commands</loc><lastmod>2025-08-28</lastmod></url><url><loc>https://razzify.in/blog/397/Basic Linux Commands</loc><lastmod>2025-10-08</lastmod></url><url><loc>https://razzify.in/blog/398/Linux File Permissions</loc><lastmod>2025-08-29</lastmod></url><url><loc>https://razzify.in/blog/399/LINUX PACKAGE MANAGEMENT</loc><lastmod>2025-08-29</lastmod></url><url><loc>https://razzify.in/blog/400/FILE PERMISSIONS</loc><lastmod>2025-08-29</lastmod></url><url><loc>https://razzify.in/blog/401/Linux Package Management</loc><lastmod>2025-08-30</lastmod></url><url><loc>https://razzify.in/blog/402/First Steps with Linux : Your Beginner&#x27;s Guide</loc><lastmod>2025-08-31</lastmod></url><url><loc>https://razzify.in/blog/403/CRYPTOGRAPHY</loc><lastmod>2025-08-30</lastmod></url><url><loc>https://razzify.in/blog/404/Linux Package Management</loc><lastmod>2025-08-31</lastmod></url><url><loc>https://razzify.in/blog/405/Linux File Permissions</loc><lastmod>2025-08-30</lastmod></url><url><loc>https://razzify.in/blog/406/LINUX FILE PERMISSION AND PACKAGE MANAGEMENT </loc><lastmod>2025-08-31</lastmod></url><url><loc>https://razzify.in/blog/407/Linux File Permission</loc><lastmod>2025-08-31</lastmod></url><url><loc>https://razzify.in/blog/408/CRYPTOGRAPHY</loc><lastmod>2025-08-31</lastmod></url><url><loc>https://razzify.in/blog/409/Introduction to Cryptography</loc><lastmod>2025-08-31</lastmod></url><url><loc>https://razzify.in/blog/410/Cryptography</loc><lastmod>2025-09-01</lastmod></url><url><loc>https://razzify.in/blog/411/CRYPTOGRAPHY </loc><lastmod>2025-09-17</lastmod></url><url><loc>https://razzify.in/blog/412/File Permissions in Linux</loc><lastmod>2025-09-03</lastmod></url><url><loc>https://razzify.in/blog/413/ LINUX File Permissions</loc><lastmod>2025-09-05</lastmod></url><url><loc>https://razzify.in/blog/414/GOOGLE DORKING</loc><lastmod>2025-09-05</lastmod></url><url><loc>https://razzify.in/blog/415/Google Dorking</loc><lastmod>2025-09-06</lastmod></url><url><loc>https://razzify.in/blog/416/Google Dorking</loc><lastmod>2025-09-07</lastmod></url><url><loc>https://razzify.in/blog/417/Phases of Hacking</loc><lastmod>2025-09-06</lastmod></url><url><loc>https://razzify.in/blog/418/PHASES OF HACKING </loc><lastmod>2025-09-07</lastmod></url><url><loc>https://razzify.in/blog/419/Google Dorking</loc><lastmod>2025-09-07</lastmod></url><url><loc>https://razzify.in/blog/420/Phases of Ethical Hacking</loc><lastmod>2025-09-07</lastmod></url><url><loc>https://razzify.in/blog/421/Phases of Ethical Hacking</loc><lastmod>2025-09-07</lastmod></url><url><loc>https://razzify.in/blog/422/Cryptography : The Art of Keeping Secrets</loc><lastmod>2025-09-07</lastmod></url><url><loc>https://razzify.in/blog/423/Google Dorking </loc><lastmod>2025-09-07</lastmod></url><url><loc>https://razzify.in/blog/424/Phases Of Ethical Hacking</loc><lastmod>2025-09-07</lastmod></url><url><loc>https://razzify.in/blog/425/Cryptography</loc><lastmod>2025-09-09</lastmod></url><url><loc>https://razzify.in/blog/426/Hacking Windows With Metapreter</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://razzify.in/blog/427/Hacking Windows with Meterpreter </loc><lastmod>2025-09-13</lastmod></url><url><loc>https://razzify.in/blog/428/BASIC PENTESTING Vulnhub Walkthrough </loc><lastmod>2025-09-12</lastmod></url><url><loc>https://razzify.in/blog/429/HACKING WINDOWS  USING METERPETER </loc><lastmod>2025-09-20</lastmod></url><url><loc>https://razzify.in/blog/430/Windows Hacking using Meterpreter</loc><lastmod>2025-09-13</lastmod></url><url><loc>https://razzify.in/blog/431/CYBERSECURITY FOR BEGINNERS </loc><lastmod>2025-09-13</lastmod></url><url><loc>https://razzify.in/blog/432/Windows Hacking using Metasploit</loc><lastmod>2025-09-14</lastmod></url><url><loc>https://razzify.in/blog/433/Basic Pentesting 1 Vulnhub Walkthrough</loc><lastmod>2025-09-15</lastmod></url><url><loc>https://razzify.in/blog/434/Bits, Bytes &amp; Addresses: The World of Internet Protocol</loc><lastmod>2025-09-16</lastmod></url><url><loc>https://razzify.in/blog/435/Basic Pentesting 1 Vulnhub Walkthrough</loc><lastmod>2025-09-17</lastmod></url><url><loc>https://razzify.in/blog/436/Basic Pentesting Using Vulnhub</loc><lastmod>2025-09-17</lastmod></url><url><loc>https://razzify.in/blog/437/Easy Steps to Perform Basic Log Analysis in Linux</loc><lastmod>2025-09-18</lastmod></url><url><loc>https://razzify.in/blog/438/The Windows Registry: A Central Pillar of the Windows Operating System</loc><lastmod>2025-09-18</lastmod></url><url><loc>https://razzify.in/blog/439/OWASP Top 10 Vulnerabilities</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://razzify.in/blog/440/Basic Pentesting 1 Walkthrough |Vulnhub</loc><lastmod>2025-09-19</lastmod></url><url><loc>https://razzify.in/blog/441/OWASP TOP 10 VULNERABILITIES </loc><lastmod>2025-09-20</lastmod></url><url><loc>https://razzify.in/blog/442/Owasp Top 10 Vulnerabilities</loc><lastmod>2025-09-20</lastmod></url><url><loc>https://razzify.in/blog/443/BASIC PENTESTING 2 VULNHUB</loc><lastmod>2025-09-20</lastmod></url><url><loc>https://razzify.in/blog/444/Cybersploit :1 VulnHub Walkthrough</loc><lastmod>2025-09-21</lastmod></url><url><loc>https://razzify.in/blog/445/Detecting Malware with Virus Total in Wazuh SIEM</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://razzify.in/blog/446/OWASP(Open Web Application Security Project)</loc><lastmod>2025-09-21</lastmod></url><url><loc>https://razzify.in/blog/448/Basic Pentesting 2 Walkthrough |Vulnhub</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://razzify.in/blog/449/Cyber security jobs for freshers and job rolls</loc><lastmod>2025-09-23</lastmod></url><url><loc>https://razzify.in/blog/450/Demystifying Computer Networks: A Beginner&#x27;s Guide </loc><lastmod>2025-09-24</lastmod></url><url><loc>https://razzify.in/blog/451/Project 1 How I Managed to Overcome a Simple Login Page</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://razzify.in/blog/452/DICTIONARY ATTACK </loc><lastmod>2025-09-25</lastmod></url><url><loc>https://razzify.in/blog/453/Project 2 Exploring Shopify: Safe Pentesting on Your Own Stores</loc><lastmod>2025-09-27</lastmod></url><url><loc>https://razzify.in/blog/454/ PLAN FOR PENETRATION TESTING  FROM HACKERONE.</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://razzify.in/blog/455/Project 1 - BRUTE FORCE LOGIN: DICTIONARY ATTACK</loc><lastmod>2025-10-11</lastmod></url><url><loc>https://razzify.in/blog/456/Decoding Cryptography</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://razzify.in/blog/457/Google Dorking: The Power of Advanced Search in Cybersecurity</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://razzify.in/blog/458/Phases of Hacking: Steps, Tools &amp; How They Work</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://razzify.in/blog/459/Brut force login Dictionary Attack</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://razzify.in/blog/460/Project 2 - IDENTIFYING BEST TARGET FROM HACKERONE FOR PENETRATION TESTING</loc><lastmod>2025-10-11</lastmod></url><url><loc>https://razzify.in/blog/461/CAPTURE THE FLAG (CTF) CHALLANGE - VULNHUB ICA: 1</loc><lastmod>2025-09-26</lastmod></url><url><loc>https://razzify.in/blog/462/Etsy Reconnaissance: A Deep Dive into a Target</loc><lastmod>2025-09-26</lastmod></url><url><loc>https://razzify.in/blog/463/Project 3 Reconnaissance on Shopify</loc><lastmod>2025-09-26</lastmod></url><url><loc>https://razzify.in/blog/464/EXPLORING VULNERABILITY IN ETSY</loc><lastmod>2025-09-27</lastmod></url><url><loc>https://razzify.in/blog/465/Project 3 - RECON WALKTHROUGH – TARGET: IRCLOGS.WORDPRESS.ORG</loc><lastmod>2025-10-11</lastmod></url><url><loc>https://razzify.in/blog/466/Exploring Shopify Vulnerbility </loc><lastmod>2025-09-28</lastmod></url><url><loc>https://razzify.in/blog/467/Brute Force Login </loc><lastmod>2025-09-28</lastmod></url><url><loc>https://razzify.in/blog/468/Plan For Pentesting (Git Lab From HackerOne Program)</loc><lastmod>2025-09-28</lastmod></url><url><loc>https://razzify.in/blog/470/Project 4 - TESTING FOR LOGIC AND DEPENDENCY ISSUES</loc><lastmod>2025-10-11</lastmod></url><url><loc>https://razzify.in/blog/471/Info of Google Dorking...</loc><lastmod>2025-09-29</lastmod></url><url><loc>https://razzify.in/blog/472/WEB SECURITY TESTING</loc><lastmod>2025-10-02</lastmod></url><url><loc>https://razzify.in/blog/473/Basic Attack Methodologies</loc><lastmod>2025-10-02</lastmod></url><url><loc>https://razzify.in/blog/506/Case Study: WannaCry Ransomware Attack (2017)</loc><lastmod>2025-10-03</lastmod></url><url><loc>https://razzify.in/blog/507/Introduction to  Computer Network</loc><lastmod>2025-10-04</lastmod></url><url><loc>https://razzify.in/blog/508/Exploring Subdomains in gitlabs</loc><lastmod>2025-10-05</lastmod></url><url><loc>https://razzify.in/blog/509/Exploring Vulnerabilities In Gitlabs</loc><lastmod>2025-10-05</lastmod></url><url><loc>https://razzify.in/blog/510/Computer Networking Banter</loc><lastmod>2025-10-05</lastmod></url><url><loc>https://razzify.in/blog/511/Exploring  the Network: Your Guide to Ports, IPs, and Protocols</loc><lastmod>2025-10-05</lastmod></url><url><loc>https://razzify.in/blog/512/IP Address Management And Dynamic Host Configuration Protocol </loc><lastmod>2025-10-05</lastmod></url><url><loc>https://razzify.in/blog/513/CONCEPTS OF LINUX</loc><lastmod>2025-10-06</lastmod></url><url><loc>https://razzify.in/blog/514/computer networking </loc><lastmod>2025-10-07</lastmod></url><url><loc>https://razzify.in/blog/515/A Beginner’s Guide to Understanding Linux</loc><lastmod>2025-10-07</lastmod></url><url><loc>https://razzify.in/blog/516/computer networking</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/517/Linux: The Backbone of Innovation and Reliability</loc><lastmod>2025-10-07</lastmod></url><url><loc>https://razzify.in/blog/518/Securing Information in the Digital Age</loc><lastmod>2025-10-07</lastmod></url><url><loc>https://razzify.in/blog/519/Project 5 Basic Attack Methodologies</loc><lastmod>2025-10-08</lastmod></url><url><loc>https://razzify.in/blog/520/Persistence and Re-exploration</loc><lastmod>2025-10-07</lastmod></url><url><loc>https://razzify.in/blog/553/BASIC CONCEPTS OF CRYPTOGRAPHY AND STEGANOGRAPHY</loc><lastmod>2025-10-07</lastmod></url><url><loc>https://razzify.in/blog/554/cryptography</loc><lastmod>2025-10-08</lastmod></url><url><loc>https://razzify.in/blog/555/Common Website Hacking Techniques</loc><lastmod>2025-10-09</lastmod></url><url><loc>https://razzify.in/blog/556/Crypto Basics</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/557/COMPUTER NETWORKING IN A NUTSHELL</loc><lastmod>2025-10-09</lastmod></url><url><loc>https://razzify.in/blog/558/Cybersecurity Exposed: Wi-Fi and Android Hacking Insights&quot;</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/559/INTRTODUCTION TO LINUX OPERATING SYSTEM </loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/560/NETWORKING</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/561/The Foundation of Digital Communication</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/562/Into the world of Networking </loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/563/FROM CLICKS TO COMMANDS: A BEGINNER&#x27;S GUIDE TO LINUX</loc><lastmod>2025-10-14</lastmod></url><url><loc>https://razzify.in/blog/564/UNTANGING THE WEB: A SIMPLE DIVE INTO NETWORKING</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/565/TOP NETWOKING TERMS EVERY BEGINNER SHOULD KNOW</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/566/From Reconnaissance to Ransomware: A Hacker&#x27;s Journey</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/567/DOCUMENTATION,EVIDENCE,EXPLOIT VALIDATION</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/568/RE-EXPLORATION </loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/569/Documentation, Evidence, and Exploit Validation</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/570/Vulnerability Report Submission</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://razzify.in/blog/571/Vulnerability Report Submission</loc><lastmod>2025-10-11</lastmod></url><url><loc>https://razzify.in/blog/572/Project 6 Persistence and Re-exploration</loc><lastmod>2025-10-11</lastmod></url><url><loc>https://razzify.in/blog/573/Project 7 - Documentation, Evidence, and Exploit Validation</loc><lastmod>2025-10-11</lastmod></url><url><loc>https://razzify.in/blog/574/Project 8 — Vulnerability Report Submission</loc><lastmod>2025-10-11</lastmod></url><url><loc>https://razzify.in/blog/575/Networking Basics Simplified</loc><lastmod>2025-10-14</lastmod></url><url><loc>https://razzify.in/blog/576/Basic Attack Methodologies</loc><lastmod>2025-10-12</lastmod></url><url><loc>https://razzify.in/blog/577/Persistence &amp; Rexploration</loc><lastmod>2025-10-12</lastmod></url><url><loc>https://razzify.in/blog/578/Report Submission And Documentation</loc><lastmod>2025-10-12</lastmod></url><url><loc>https://razzify.in/blog/579/TCP v/s UDP</loc><lastmod>2025-10-12</lastmod></url><url><loc>https://razzify.in/blog/580/Basic Linux Commands Every User Should Know</loc><lastmod>2025-10-12</lastmod></url><url><loc>https://razzify.in/blog/581/Unveiling System Hacking: Tools, Exploits, and Cyber Threats</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/582/The Silent Guardian of the Internet: Understanding Cryptography</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/583/The Invisible Code: Unraveling Networking Protocols</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/584/“Cryptography — The Silent Guardian of the Digital World”</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/585/STEGANOGRAPHY</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/586/Unlocking the Kernel: Demystifying Linux from the Core</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://razzify.in/blog/587/CRYPTOGRAPHY AND ITS SIGNIFICANCE </loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/588/Why Stenography Still Matters</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/589/“Invisible Security: How Steganography Protects Digital Information”</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/590/Type, Enter, Conquer: Your First Steps into Linux Commands</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/591/CRYPTOGRAPHY</loc><lastmod>2025-10-13</lastmod></url><url><loc>https://razzify.in/blog/592/System hacking and phases of hacking </loc><lastmod>2025-10-16</lastmod></url><url><loc>https://razzify.in/blog/593/Mastering Linux Fundamentals and Essential Commands</loc><lastmod>2025-10-14</lastmod></url><url><loc>https://razzify.in/blog/594/Basic Pentesting -1 Walkthrough | Vulnhub</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/595/Basic Pentesting -2 CTF walkthrough | vulnhub</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/597/Setting Up Your Ethical Hacking Lab: Exploit Practice</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/598/COMPUTER NETWORKING</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/599/ CRYPTOGRAPHY AND STEGANOGRAPHY </loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/600/INTRODUCTION TO LINUX</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/601/The Hidden Language of Security: Cryptography Explained</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/602/Decoding the Secrets of Digital Security</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/603/“The Ultimate Website Checkup”</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/605/INTO THE WORLD OF SYSTEM HACKING </loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/606/Basics of Network Security</loc><lastmod>2025-10-15</lastmod></url><url><loc>https://razzify.in/blog/607/Linux- its types, structure and commands</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://razzify.in/blog/608/Basics Concepts of System Hacking</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://razzify.in/blog/609/What is LINUX ??</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://razzify.in/blog/610/Data to Devices: How Networking Connects Our World</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://razzify.in/blog/611/Understanding some basic concepts of networking</loc><lastmod>2025-10-21</lastmod></url><url><loc>https://razzify.in/blog/612/Double-Edged Sword: AI for Security vs. AI for Hacking</loc><lastmod>2025-10-21</lastmod></url><url><loc>https://razzify.in/blog/613/Decoding Secrets: The Hidden World of Cryptography</loc><lastmod>2025-10-22</lastmod></url><url><loc>https://razzify.in/blog/614/How Deleted Files Still Speaks ; The Science Of DATA CARVING </loc><lastmod>2025-10-28</lastmod></url><url><loc>https://razzify.in/blog/615/Importance of Hiding Information in Steganography</loc><lastmod>2025-10-22</lastmod></url><url><loc>https://razzify.in/blog/616/LINUX-THE BACKBONE OF CYBERSECURITY</loc><lastmod>2025-10-22</lastmod></url><url><loc>https://razzify.in/blog/617/CRACK THE LAB : WALKTHROUGH OF BASIC PENTESTING 2 ON VULNHUB</loc><lastmod>2025-10-22</lastmod></url><url><loc>https://razzify.in/blog/618/CVE of the Week: Log4Shell (CVE-2021-44228)</loc><lastmod>2025-10-23</lastmod></url><url><loc>https://razzify.in/blog/619/“OWASP Top 10 in Action with DVWA”</loc><lastmod>2025-10-23</lastmod></url><url><loc>https://razzify.in/blog/620/Cryptography</loc><lastmod>2025-10-24</lastmod></url><url><loc>https://razzify.in/blog/621/Steganography</loc><lastmod>2025-10-24</lastmod></url><url><loc>https://razzify.in/blog/622/Pentesting</loc><lastmod>2025-10-24</lastmod></url><url><loc>https://razzify.in/blog/623/computer networking</loc><lastmod>2025-10-24</lastmod></url><url><loc>https://razzify.in/blog/624/what is computer networking ???</loc><lastmod>2025-10-28</lastmod></url><url><loc>https://razzify.in/blog/625/Cracking Windows 7: Complete Pentesting with Meterpreter</loc><lastmod>2025-10-25</lastmod></url><url><loc>https://razzify.in/blog/626/ Cracking Basic Pentesting 1 on Vulnhub</loc><lastmod>2025-10-25</lastmod></url><url><loc>https://razzify.in/blog/627/Mastering Penetration Testing: Uncovering Vulnerabilities to Strengthen Cybersecurity</loc><lastmod>2025-10-25</lastmod></url><url><loc>https://razzify.in/blog/628/Guardians of Code: Burp Suite Meets Metasploit Mastery</loc><lastmod>2025-10-25</lastmod></url><url><loc>https://razzify.in/blog/629/PENETRATION TESTING</loc><lastmod>2025-10-27</lastmod></url><url><loc>https://razzify.in/blog/630/Steganography: The Hidden Art of Secret Communication</loc><lastmod>2025-10-28</lastmod></url><url><loc>https://razzify.in/blog/631/Man-in-the-Middle (MITM) Attack : The Silent Threat in Your Connection</loc><lastmod>2025-10-28</lastmod></url><url><loc>https://razzify.in/blog/632/CVE of the Week: EternalBlue (CVE-2017-0144) – The Exploit Behind the WannaCry Outbreak</loc><lastmod>2025-10-28</lastmod></url><url><loc>https://razzify.in/blog/633/The Invisible Thief: How a MITM Attack Steals Your Data</loc><lastmod>2025-10-28</lastmod></url><url><loc>https://razzify.in/blog/634/Recovering Deleted Images Using Data Carving  </loc><lastmod>2025-10-28</lastmod></url><url><loc>https://razzify.in/blog/635/WHAT IS PENETRATION TESTING? A BEGINNER&#x27;S GUIDE TO ETHICAL CYBERSECURITY</loc><lastmod>2025-10-29</lastmod></url><url><loc>https://razzify.in/blog/636/Teaching MITM: Labs, Tools, and Awareness Strategies</loc><lastmod>2025-10-30</lastmod></url><url><loc>https://razzify.in/blog/637/Cracking the Airwaves: Ethical Wi-Fi Hacking and android hacking Explained</loc><lastmod>2025-10-30</lastmod></url><url><loc>https://razzify.in/blog/638/MITM Unmasked: Anatomy, Tools, and Countermeasures.</loc><lastmod>2025-10-31</lastmod></url><url><loc>https://razzify.in/blog/639/Uncovering the Web’s Hidden Layers: A Deep Dive into Google Dorking</loc><lastmod>2025-10-31</lastmod></url><url><loc>https://razzify.in/blog/640/Solving the Web Wizard&#x27;s Grimoire Challenge</loc><lastmod>2025-10-31</lastmod></url><url><loc>https://razzify.in/blog/641/about networks -- Nazneen Alvi</loc><lastmod>2025-11-12</lastmod></url><url><loc>https://razzify.in/blog/642/Networking</loc><lastmod>2025-11-10</lastmod></url><url><loc>https://razzify.in/blog/643/ IP addresses, UDP, and TCP—the trio that keeps our online world spinning</loc><lastmod>2025-11-11</lastmod></url><url><loc>https://razzify.in/blog/644/COMPUTER NETWORKING</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://razzify.in/blog/645/OWASP Top 10 Web Application Vulnerabilities</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://razzify.in/blog/646/LINUX  : Fundaments and Basic Commands</loc><lastmod>2025-11-15</lastmod></url><url><loc>https://razzify.in/blog/647/About Linux Files and management.</loc><lastmod>2025-11-15</lastmod></url><url><loc>https://razzify.in/blog/648/Step Into Linux: Explore the Open-Source World</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://razzify.in/blog/649/LINUX</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://razzify.in/blog/650/CRYPTOGRAPHY</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://razzify.in/blog/651/GOOGLE DORKING</loc><lastmod>2025-11-21</lastmod></url><url><loc>https://razzify.in/blog/652/Cryptography: The Science of Secure Communication</loc><lastmod>2025-11-22</lastmod></url><url><loc>https://razzify.in/blog/653/CRPTOGRAPHY</loc><lastmod>2025-11-23</lastmod></url><url><loc>https://razzify.in/blog/654/Blog on Cryptography.</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://razzify.in/blog/655/Understanding Computer Networks Through Real Attacks: Nmap, Ports &amp; Packet Analysis</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://razzify.in/blog/656/Getting Started With Linux &amp; OSINT – A Beginner-Friendly Guide With Practical Exercises</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://razzify.in/blog/657/Mastering Windows OS for Cybersecurity – Hands-On With TryHackMe Labs</loc><lastmod>2025-11-26</lastmod></url><url><loc>https://razzify.in/blog/658/Mastering Google Dorking: Unleash the Power of Advanced Searches</loc><lastmod>2025-11-27</lastmod></url><url><loc>https://razzify.in/blog/659/WINDOWS HACKING </loc><lastmod>2025-12-01</lastmod></url><url><loc>https://razzify.in/blog/660/The Art of Digital Detective Work: A Journey Through OSINT</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://razzify.in/blog/661/A Complete Beginner’s Guide to Cyber Security and Penetration Testing</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://razzify.in/blog/662/OSINT: Open Source Intelligence</loc><lastmod>2025-12-02</lastmod></url><url><loc>https://razzify.in/blog/663/VulnHub Machine Walkthroughs</loc><lastmod>2025-12-07</lastmod></url><url><loc>https://razzify.in/blog/664/DVWA</loc><lastmod>2025-12-07</lastmod></url><url><loc>https://razzify.in/blog/665/Vulnhub machine walkthrough-</loc><lastmod>2025-12-07</lastmod></url><url><loc>https://razzify.in/blog/666/DVWA</loc><lastmod>2025-12-08</lastmod></url><url><loc>https://razzify.in/blog/667/System Penetration Testing: Understanding the Backbone of Modern Cybersecurity</loc><lastmod>2025-12-08</lastmod></url><url><loc>https://razzify.in/blog/668/🌐 Web Penetration Testing: The Complete Guide to Securing Modern Web Applications</loc><lastmod>2025-12-08</lastmod></url><url><loc>https://razzify.in/blog/669/Understanding Computer Networks Through Real Attacks: Nmap, Ports &amp; Packet Analysis</loc><lastmod>2025-12-09</lastmod></url><url><loc>https://razzify.in/blog/670/Mastering Windows OS for Cybersecurity – Hands-On with TryHackMe Labs</loc><lastmod>2025-12-09</lastmod></url><url><loc>https://razzify.in/blog/671/GOOGLE DORKING</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://razzify.in/blog/672/WINDOWS HACKING</loc><lastmod>2025-12-10</lastmod></url><url><loc>https://razzify.in/blog/673/Forgotten index</loc><lastmod>2025-12-11</lastmod></url><url><loc>https://razzify.in/blog/674/HackerOne Penetration</loc><lastmod>2025-12-12</lastmod></url><url><loc>https://razzify.in/blog/675/recon pentesting</loc><lastmod>2025-12-12</lastmod></url><url><loc>https://razzify.in/blog/676/Google Dorking</loc><lastmod>2025-12-13</lastmod></url><url><loc>https://razzify.in/blog/677/Computer Networking Concepts and Basics</loc><lastmod>2025-12-16</lastmod></url><url><loc>https://razzify.in/blog/678/Computer Networking Concepts</loc><lastmod>2025-12-17</lastmod></url><url><loc>https://razzify.in/blog/679/TCP vs UDP</loc><lastmod>2025-12-17</lastmod></url><url><loc>https://razzify.in/blog/680/Logic and Dependencies issues</loc><lastmod>2025-12-18</lastmod></url><url><loc>https://razzify.in/blog/681/TCP VS UDP</loc><lastmod>2025-12-21</lastmod></url><url><loc>https://razzify.in/blog/682/TCP OVERVIEW</loc><lastmod>2025-12-21</lastmod></url><url><loc>https://razzify.in/blog/683/Protocols</loc><lastmod>2025-12-21</lastmod></url><url><loc>https://razzify.in/blog/684/Basic Web Attack Methodologies</loc><lastmod>2025-12-21</lastmod></url><url><loc>https://razzify.in/blog/685/Windows Post-Exploitation Using Meterpreter</loc><lastmod>2025-12-24</lastmod></url><url><loc>https://razzify.in/blog/686/Mastering VulnHub for Hands-On Penetration Testing</loc><lastmod>2025-12-24</lastmod></url><url><loc>https://razzify.in/blog/687/DVWA Overview</loc><lastmod>2025-12-24</lastmod></url><url><loc>https://razzify.in/blog/688/Linux Fundamentals</loc><lastmod>2025-12-27</lastmod></url><url><loc>https://razzify.in/blog/689/Google Dorking</loc><lastmod>2025-12-27</lastmod></url><url><loc>https://razzify.in/blog/690/Linux fundamentals</loc><lastmod>2025-12-31</lastmod></url><url><loc>https://razzify.in/blog/691/Google Dorking</loc><lastmod>2025-12-31</lastmod></url><url><loc>https://razzify.in/blog/692/LINUX FUNDAMENTALS</loc><lastmod>2026-01-08</lastmod></url><url><loc>https://razzify.in/blog/693/GOOGLE DORKING</loc><lastmod>2026-01-08</lastmod></url><url><loc>https://razzify.in/blog/694/SOC_Analyst</loc><lastmod>2026-01-11</lastmod></url><url><loc>https://razzify.in/blog/695/SOC Analyst 1st Weekend Challenge</loc><lastmod>2026-01-12</lastmod></url><url><loc>https://razzify.in/blog/696/SOC analyst first week challenge</loc><lastmod>2026-01-13</lastmod></url><url><loc>https://razzify.in/blog/697/Week 1 - My SOC Journey Recap.</loc><lastmod>2026-01-13</lastmod></url><url><loc>https://razzify.in/blog/698/SOC Analyst 1st Weekend Challenge</loc><lastmod>2026-01-13</lastmod></url><url><loc>https://razzify.in/blog/699/SOC Analyst 2nd Weekend Challenge</loc><lastmod>2026-01-18</lastmod></url><url><loc>https://razzify.in/blog/700/OSI Model vs TCP/IP Model</loc><lastmod>2026-01-18</lastmod></url><url><loc>https://razzify.in/blog/701/ SOC Analyst 2nd Weekend Challenge </loc><lastmod>2026-01-19</lastmod></url><url><loc>https://razzify.in/blog/702/Wi-Fi Hacking : Deauthentication Attack and Password Cracking.</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://razzify.in/blog/703/Port of Secrets</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://razzify.in/blog/704/Internal Glimpse – SSRF Challenge Write-Up (Challenge 14)</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://razzify.in/blog/705/CTF 0 - Forgotten index </loc><lastmod>2026-01-21</lastmod></url><url><loc>https://razzify.in/blog/706/CTF 1 - The Web Wizard&#x27;s Secret</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://razzify.in/blog/707/CTF 2 - R0b0 Riddle</loc><lastmod>2026-01-21</lastmod></url><url><loc>https://razzify.in/blog/708/Brute Force Login: Dictionary Attack</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/709/Forgotten Index</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/710/The Web Wizard&#x27;s Secret</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/711/The Wandering Document</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/712/R0b0 Riddle</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/713/Leftover Secrets</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/714/LINUX FUNDEMENTALS</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/715/GOOGLE DROKING</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/716/The Whistleblower</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/717/WINDOWS HACKING</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/718/MAN IN THE MIDDLE ATTACK</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/719/WEB APP VULNERABILITIES</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/720/Windows 7 Pentesting with Meterpreter </loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/721/Internal Glimpse</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/722/SQL 101</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/723/SQL 101</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/724/LINUX FUNDEMENTALS</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/725/GOOGLE DROKING</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/726/Dangerous Defaults</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/727/WINDOWS HACKING</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/728/MAN IN THE MIDDLE ATTACK</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/729/WEB APP VULNERABILITIES</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/730/Forgotten Index - Writeup</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/731/ The Web Wizard&#x27;s Secret  - Writeup</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/732/🛡️ TCS HackQuest CTF — Season 10: Round 2 Challenge Walkthrough</loc><lastmod>2026-01-25</lastmod></url><url><loc>https://razzify.in/blog/733/TCS HackQuest CTF Season 10: Round 1 Challenge Walkthrough</loc><lastmod>2026-01-25</lastmod></url><url><loc>https://razzify.in/blog/734/Port of Secrets</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://razzify.in/blog/735/Privileged Cookies</loc><lastmod>2026-01-23</lastmod></url><url><loc>https://razzify.in/blog/736/Dangerous Defaults - Write Up</loc><lastmod>2026-01-23</lastmod></url><url><loc>https://razzify.in/blog/737/Web Wizard’s Fragmented Secret — Razzify CTF Writeup</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://razzify.in/blog/738/Forgotten Index — Razzify CTF Writeup</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://razzify.in/blog/739/R0b0 Riddle — Razzify CTF Writeup</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://razzify.in/blog/740/The Wandering Document — Razzify CTF Writeup</loc><lastmod>2026-01-25</lastmod></url><url><loc>https://razzify.in/blog/741/SQL 101 CTF Write-Up</loc><lastmod>2026-01-25</lastmod></url><url><loc>https://razzify.in/blog/742/Upload and Conquer (File Upload Vulnerability)  writeup </loc><lastmod>2026-01-25</lastmod></url><url><loc>https://razzify.in/blog/743/🥐 Privileged Cookies — CTF Write-Up</loc><lastmod>2026-01-26</lastmod></url><url><loc>https://razzify.in/blog/744/📝 Writeup: Brute Force Login – Razzpay</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://razzify.in/blog/745/📝 Writeup: Leftover Secrets </loc><lastmod>2026-01-27</lastmod></url><url><loc>https://razzify.in/blog/746/🛡️ Challenge: Profile Peek</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://razzify.in/blog/747/CTF Write-up: Brute Force Login – Dictionary Attack (Beginner Friendly)</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/748/The Web Wizard’s Secret</loc><lastmod>2026-01-27</lastmod></url><url><loc>https://razzify.in/blog/749/🕵️‍♂️ The Whistleblower writeup </loc><lastmod>2026-01-27</lastmod></url><url><loc>https://razzify.in/blog/750/Man-in-the-Middle (MITM) Attack</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/751/Web Application Vulnerabilities in DVWA</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/752/R0b0 Riddle</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/753/The Wandering Document</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/754/Brute Force Login Using Dictionary Attack</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/755/Forgotten Index</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/756/Write-up: Internal Glimpse </loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/757/Write-up: Dangerous Defaults</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/758/Leftover Secrets</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/759/Header Hijack writeup </loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/760/🏴 Echoes from PingSite  Writeup</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/761/🏴 Cache Me If You Can  Writeup</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/762/🏴 Stored Script  Writeup</loc><lastmod>2026-01-28</lastmod></url><url><loc>https://razzify.in/blog/763/🏴 Port of Secrets  Writeup</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://razzify.in/blog/764/The Case of ACME Corp&#x27;s.</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/765/Write-up: Forgotten Index</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/766/DVWA CTF Challanges for Bruteforce, Command Exeaution, SQL Injection and CSRF</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/767/Broken Trust Writeup</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/768/Profile Includes writeup</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://razzify.in/blog/769/SQL Injection 101 - Authentication Bypass (CTF Walkthrough)</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/770/NoSQL with Regex</loc><lastmod>2026-01-31</lastmod></url><url><loc>https://razzify.in/blog/771/The Leaky Debugger Writeup </loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/772/Forgotten Index</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/773/🛡️ CTF Writeup – MirrorMart</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/774/The Web Wizard&#x27;s Secret - writeup </loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/775/The Wandering Document</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/776/R0b0 Riddle</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/777/Leftover Secrets</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/778/Internal Glimpse</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/779/SQL 101</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/blog/780/Forgotten Index </loc><lastmod>2026-01-30</lastmod></url><url><loc>https://razzify.in/blog/781/Brute Force Login: Dictionary Attack</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://razzify.in/blog/782/Brute Force Login: Dictionary Attack</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://razzify.in/blog/783/Header Hijack</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://razzify.in/blog/784/Profile Peek</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://razzify.in/blog/785/The Whistleblower</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://razzify.in/blog/786/Dangerous Defaults</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://razzify.in/blog/787/Privileged Cookies</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://razzify.in/blog/788/The Web Wizard&#x27;s Secret</loc><lastmod>2026-01-30</lastmod></url><url><loc>https://razzify.in/blog/789/🧙‍♂️ The Web Wizard’s Secret</loc><lastmod>2026-01-31</lastmod></url><url><loc>https://razzify.in/blog/790/🤖 R0b0 Riddle</loc><lastmod>2026-01-31</lastmod></url><url><loc>https://razzify.in/blog/791/🕵️ The Whistleblower</loc><lastmod>2026-01-31</lastmod></url><url><loc>https://razzify.in/blog/792/Echoes from the PingSite</loc><lastmod>2026-01-31</lastmod></url><url><loc>https://razzify.in/blog/793/SecureTech Whistleblower</loc><lastmod>2026-01-31</lastmod></url><url><loc>https://razzify.in/blog/794/Learning from an Information Disclosure Caused by Debug Misconfiguration</loc><lastmod>2026-02-01</lastmod></url><url><loc>https://razzify.in/blog/795/CORS Misconfig - CTF Challenge</loc><lastmod>2026-02-01</lastmod></url><url><loc>https://razzify.in/blog/796/The Leaky Debugger</loc><lastmod>2026-02-01</lastmod></url><url><loc>https://razzify.in/blog/797/Profile Includes</loc><lastmod>2026-02-01</lastmod></url><url><loc>https://razzify.in/blog/798/Echoes from PingSite</loc><lastmod>2026-02-01</lastmod></url><url><loc>https://razzify.in/blog/799/3-Month Roadmap: Zero to Job-Ready SOC Analyst</loc><lastmod>2026-02-02</lastmod></url><url><loc>https://razzify.in/blog/800/SOC Analyst Requirements: Skills, Tools, and Certifications</loc><lastmod>2026-02-02</lastmod></url><url><loc>https://razzify.in/blog/801/🌐 Cyber Security for Beginners</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://razzify.in/blog/802/Finding My Way into Cybersecurity</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://razzify.in/blog/803/EIGHT CYBERSECURITY DOMAINS, EIGHT DIFFERENT JOURNEYS</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://razzify.in/blog/804/Beyond Hacking: Finding Your Niche in the Cyber Field</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://razzify.in/blog/806/Understanding the OSI Model</loc><lastmod>2026-02-03</lastmod></url><url><loc>https://razzify.in/blog/807/Host Hijack Heist</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://razzify.in/blog/808/Flaws Everywhere</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://razzify.in/blog/809/Brute the Maze</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://razzify.in/blog/810/Building a Career in ICS Security: From Electrical Systems to Cyber Defense</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://razzify.in/blog/811/Brute the Maze</loc><lastmod>2026-02-04</lastmod></url><url><loc>https://razzify.in/blog/812/Privileged Cookies</loc><lastmod>2026-02-05</lastmod></url><url><loc>https://razzify.in/blog/814/CYBER KILL CHAIN</loc><lastmod>2026-02-05</lastmod></url><url><loc>https://razzify.in/blog/815/OSI Model in Cybersecurity: How Data Moves and Where Attacks &amp; Defenses Occur</loc><lastmod>2026-02-05</lastmod></url><url><loc>https://razzify.in/blog/816/Windows 7 Pentesting with Meterpreter and phases</loc><lastmod>2026-02-05</lastmod></url><url><loc>https://razzify.in/blog/818/The Web Wizard&#x27;s Secret</loc><lastmod>2026-02-10</lastmod></url><url><loc>https://razzify.in/blog/819/The Wandering Document Lab</loc><lastmod>2026-02-11</lastmod></url><url><loc>https://razzify.in/blog/820/HTTP Tampering </loc><lastmod>2026-02-11</lastmod></url><url><loc>https://razzify.in/blog/821/🛒 Elite Shop — Business Logic Vulnerability (API Manipulation)</loc><lastmod>2026-02-13</lastmod></url><url><loc>https://razzify.in/blog/822/Cracking the Web Wizard&#x27;s Grimoire: A Beginner&#x27;s Victory Over Hidden Code</loc><lastmod>2026-02-14</lastmod></url><url><loc>https://razzify.in/blog/823/Difference between Black,Grey,White Box Penetration Testing</loc><lastmod>2026-02-15</lastmod></url><url><loc>https://razzify.in/blog/824/How i get to find no rate limit bug worth $300</loc><lastmod>2026-02-16</lastmod></url><url><loc>https://razzify.in/blog/825/Master API Security: I Built a Vulnerable Lab for Beginners (VulnShop) 🚀</loc><lastmod>2026-02-16</lastmod></url><url><loc>https://razzify.in/blog/826/Hacking Windows with Meterpreter</loc><lastmod>2026-02-17</lastmod></url><url><loc>https://razzify.in/blog/827/Man-in-the-Middle Attack</loc><lastmod>2026-02-17</lastmod></url><url><loc>https://razzify.in/blog/828/Web Application Vulnerabilities in DVWA</loc><lastmod>2026-02-17</lastmod></url><url><loc>https://razzify.in/blog/829/Setting Up a SOC Lab: Splunk Server and Attacker Machine</loc><lastmod>2026-02-18</lastmod></url><url><loc>https://razzify.in/blog/830/🛜Inside the Hacker&#x27;s World : How the Internet Really Works 🔥</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://razzify.in/blog/831/Network Scanning Using Nmap</loc><lastmod>2026-02-19</lastmod></url><url><loc>https://razzify.in/blog/832/The Fun and Creative Side of Kali Linux: 8 Terminal Commands You Should Try</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://razzify.in/blog/833/Mastering Essential Kali Linux Commands – A Practical Deep Dive</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://razzify.in/blog/834/From top to tee: A Hands-On Guide to Linux Commands</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://razzify.in/blog/835/Understanding Hydra: Brute-Force Attacks on SSH and Web Logins</loc><lastmod>2026-02-20</lastmod></url><url><loc>https://razzify.in/blog/836/Brute Force Login Detection Using Splunk</loc><lastmod>2026-02-21</lastmod></url><url><loc>https://razzify.in/blog/837/Network Hack With Python Part 1</loc><lastmod>2026-02-21</lastmod></url><url><loc>https://razzify.in/blog/838/GraphQL Misconfiguration in Enterprise LMS</loc><lastmod>2026-02-21</lastmod></url><url><loc>https://razzify.in/blog/839/Beginner&#x27;s guide to Trojan Horses ♞</loc><lastmod>2026-02-21</lastmod></url><url><loc>https://razzify.in/blog/840/Detecting DoS Attack Activity Using Splunk</loc><lastmod>2026-02-22</lastmod></url><url><loc>https://razzify.in/blog/841/Wifi Hacking Tools</loc><lastmod>2026-02-22</lastmod></url><url><loc>https://razzify.in/blog/842/10 common Kali Linux Troubleshooting Topics (How to fix them)</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://razzify.in/blog/843/SSL Pinning</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://razzify.in/blog/844/Dangerous Linux Commands Everyone Should Know</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://razzify.in/blog/845/Everyone Says “Do CTFs” — But Why?</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://razzify.in/blog/846/Cross-Site Scripting (XSS) — Part 1: Reflected XSS Explained with a Lab</loc><lastmod>2026-02-23</lastmod></url><url><loc>https://razzify.in/blog/847/10 Common Kali Linux Troubleshooting Topics (And How To Fix Them) - PART(2)</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://razzify.in/blog/848/Lab: DOM XSS in innerHTML sink using source location.search (portswigger)</loc><lastmod>2026-02-24</lastmod></url><url><loc>https://razzify.in/blog/849/Phantom Protocol (Razzify) </loc><lastmod>2026-02-25</lastmod></url><url><loc>https://razzify.in/blog/850/How to Configure a Firewall with GUFW in Kali Linux</loc><lastmod>2026-02-26</lastmod></url><url><loc>https://razzify.in/blog/851/Deep Technical Guide to Medusa in Kali Linux with Encryption, Hashing and Password Auditing</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://razzify.in/blog/852/Understanding Incidents, Events, and Logging in Cybersecurity</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://razzify.in/blog/853/Brute Force Login: Dictionary Attack</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://razzify.in/blog/854/BlacksmithAI: Open-source AI-powered penetration testing framework</loc><lastmod>2026-03-05</lastmod></url><url><loc>https://razzify.in/blog/855/Metasploit Attack on Windows 7 using EternalBlue (MS17-010)</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://razzify.in/blog/856/How Beginners Can Start With Red Teaming and Penetration Testing in 2026</loc><lastmod>2026-03-06</lastmod></url><url><loc>https://razzify.in/blog/857/How Beginners Can Start Blue Teaming in 2026</loc><lastmod>2026-03-07</lastmod></url><url><loc>https://razzify.in/blog/858/Challenge to OSINT Exercise #001</loc><lastmod>2026-03-07</lastmod></url><url><loc>https://razzify.in/blog/859/𝐎𝐖𝐀𝐒𝐏 𝐓𝐨𝐩 𝟏𝟎: 𝐓𝐡𝐞 𝐌𝐨𝐬𝐭 𝐂𝐫𝐢𝐭𝐢𝐜𝐚𝐥 𝐖𝐞𝐛 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐑𝐢𝐬𝐤𝐬</loc><lastmod>2026-03-07</lastmod></url><url><loc>https://razzify.in/blog/860/Introduction to Networking</loc><lastmod>2026-03-08</lastmod></url><url><loc>https://razzify.in/blog/861/Brute Force Login: Dictionary Attack Challenge Guide without Solution</loc><lastmod>2026-03-09</lastmod></url><url><loc>https://razzify.in/blog/862/Understanding MITRE ATT&amp;CK Framework in Cybersecurity</loc><lastmod>2026-03-09</lastmod></url><url><loc>https://razzify.in/blog/863/Lateral Movement &amp; Pivoting CTF 1 [eCPPT]</loc><lastmod>2026-03-09</lastmod></url><url><loc>https://razzify.in/blog/864/JWT Authentication Explained: How Misconfigured Tokens Lead to Security Vulnerabilities</loc><lastmod>2026-03-09</lastmod></url><url><loc>https://razzify.in/blog/865/Phishing Email Detection Using Splunk – Cybersecurity SOC Project</loc><lastmod>2026-03-15</lastmod></url><url><loc>https://razzify.in/blog/866/Top 10 Most Common Windows Problems (And How to Troubleshoot Them)</loc><lastmod>2026-03-16</lastmod></url><url><loc>https://razzify.in/blog/867/Adventures in the Wizard’s Grimoire: A Pentester’s Magical Mishap</loc><lastmod>2026-03-16</lastmod></url><url><loc>https://razzify.in/blog/869/CTF Write-Up: Hidden RFI Secret in VendorsKart</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://razzify.in/blog/870/CTF Write-Up: Midnight Mishap — Exposed Vim Swap Files</loc><lastmod>2026-03-20</lastmod></url><url><loc>https://razzify.in/blog/871/Getting Started with Splunk: A Beginner’s Guide to SIEM</loc><lastmod>2026-03-22</lastmod></url><url><loc>https://razzify.in/blog/872/Basics of Cyber Security: A Beginner’s Guide</loc><lastmod>2026-03-22</lastmod></url><url><loc>https://razzify.in/blog/873/The Digital Scavenger</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://razzify.in/blog/874/Roadmap to Become a SOC Analyst: Beginner to Job Ready</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://razzify.in/blog/875/Web Application Vulnerabilities in DVWA</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://razzify.in/blog/876/Hacking Windows with Meterpreter</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://razzify.in/blog/877/Man-in-the-Middle Attack</loc><lastmod>2026-03-25</lastmod></url><url><loc>https://razzify.in/blog/878/Top 10 More Windows Problems (Part 2) And How To Fix Them</loc><lastmod>2026-03-28</lastmod></url><url><loc>https://razzify.in/blog/879/🔐 Career in Penetration Testing: A Complete Guide for Aspiring Ethical Hackers</loc><lastmod>2026-03-28</lastmod></url><url><loc>https://razzify.in/blog/880/🐧 Linux for Beginners: A Complete Guide + 100+ Essential Commands for Hackers</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/blog/882/WINDOWS RDP EXPLOITATION LAB</loc><lastmod>2026-04-01</lastmod></url><url><loc>https://razzify.in/challenges/1/Brute Force Login: Dictionary Attack</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/2/The Web Wizard&#x27;s Secret</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/3/R0b0 Riddle</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/4/The Whistleblower</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/5/SQL 101</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/6/Privileged Cookies</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/7/Header Hijack</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/8/Profile Peek</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/9/Broken Trust</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/10/MirrorMart </loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/11/Forgotten Index</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/12/The Wandering Document</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/13/Leftover Secrets</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/14/Internal Glimpse</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/15/Dangerous Defaults</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/16/Midnight Mishap</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/17/Echoes from PingSite</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/18/Hidden RFI Secret in VendorsKart</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/19/Upload and Conquer</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/20/Cache Me If You Can</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/21/Secure Template</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/22/Profile Includes</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/23/Phantom Protocol</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/24/Git Is Fit</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/25/Archive Breach</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/26/Corporate Insider</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/27/Flaws Everywhere</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/28/Host Hijack Heist</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/29/403 Bypass</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/30/NoSQL with Regex</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/31/Database Drift</loc><lastmod>2025-12-22</lastmod></url><url><loc>https://razzify.in/challenges/32/Forecast Flaw</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/33/TaskFlow Trust</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/34/Corporate LMS Data Breach</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/35/The Tokenless Gateway</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/36/Stored Script</loc><lastmod>2025-11-20</lastmod></url><url><loc>https://razzify.in/challenges/37/Secrets in the Search</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://razzify.in/challenges/38/The Leaky Debugger</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://razzify.in/challenges/39/The Discount Hunter</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://razzify.in/challenges/40/CORS Misconfig</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://razzify.in/challenges/41/CSRF Token Validation</loc><lastmod>2025-11-24</lastmod></url><url><loc>https://razzify.in/challenges/42/Break</loc><lastmod>2025-11-25</lastmod></url><url><loc>https://razzify.in/challenges/43/Cinematic race</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://razzify.in/challenges/44/CacheMe</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://razzify.in/challenges/45/Parsing</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://razzify.in/challenges/46/Weird blog</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://razzify.in/challenges/47/Brute the Maze</loc><lastmod>2025-12-01</lastmod></url><url><loc>https://razzify.in/challenges/48/Optional Devil</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://razzify.in/challenges/49/Port of Secrets</loc><lastmod>2025-12-29</lastmod></url><url><loc>https://razzify.in/challenges/50/Spectral</loc><lastmod>2025-12-29</lastmod></url><url><loc>https://razzify.in/challenges/51/Phantom Debugger</loc><lastmod>2025-12-29</lastmod></url><url><loc>https://razzify.in/challenges/52/Shadow Pipeline</loc><lastmod>2025-12-29</lastmod></url><url><loc>https://razzify.in/challenges/53/Shadow Merge</loc><lastmod>2026-03-02</lastmod></url><url><loc>https://razzify.in/challenges/54/Base64 Ninja Transmission</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/55/Minimal Mind</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/56/Symbolic Decimals</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/57/The Digital Scavenger</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/58/Leaky Login</loc><lastmod>2026-03-23</lastmod></url><url><loc>https://razzify.in/challenges/59/Hidden in Plain Sight</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/60/Locked Inside</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/61/Echoes of the Hidden</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/62/Shared Secret</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/63/Elite XOR</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/64/Encoding Leak</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/65/Caesar Break</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/66/Vigenère Chaos</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/67/Compact</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/68/18th_Century</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/69/Binary Taste</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/70/Single-Byte XOR</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/71/Reused OTP</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/72/Grimoire Fragment</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/73/MD5 Weak Password</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/74/ECB Mode Leak</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/75/Redaction Failure</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/76/Corrupted Canvas</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/77/The Matryoshka Files</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/79/Double Vision</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/80/Log Hunter</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/81/Log Me In</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/82/QR Layers</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/83/Scan Me If You Can</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/84/Invisible Text</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/85/Browser Breadcrumbs</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/86/Ret to Win</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/87/Patch It Up</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/88/Leaky Pipe</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/89/The Lucky Number</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/90/Off By One</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/91/PyBin</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/92/Stack Cookies</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/93/XOR 4 KEY</loc><lastmod>2026-03-30</lastmod></url><url><loc>https://razzify.in/challenges/94/White APK</loc><lastmod>2026-03-30</lastmod></url>
</urlset>
