<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://astar.fyi/courses/</loc><lastmod>2025-11-25T11:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/</loc><lastmod>2025-11-25T11:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/web-application-hacking/directory-traversal/</loc><lastmod>2025-11-08T10:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/web-application-hacking/idor/</loc><lastmod>2025-11-08T10:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/web-application-hacking/sql-injection/</loc><lastmod>2025-11-03T10:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/web-application-hacking/sql-basic-syntax/</loc><lastmod>2025-11-02T10:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/web-application-hacking/csrf/</loc><lastmod>2025-11-01T10:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/web-application-hacking/xss/</loc><lastmod>2025-10-30T10:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/web-application-hacking/brute-forcing-logins/</loc><lastmod>2025-09-25T11:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/projects/</loc><lastmod>2025-06-13T22:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/posts/</loc><lastmod>2025-03-28T12:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/</loc><lastmod>2025-11-25T11:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/password-cracking/</loc><lastmod>2025-11-25T11:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/ai-hacking/data-poisoning/</loc><lastmod>2025-11-09T12:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/ai-hacking/prompt-injection/</loc><lastmod>2025-11-09T09:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/ai-hacking/</loc><lastmod>2025-11-09T07:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/web-application-hacking/</loc><lastmod>2025-10-30T09:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/mitm_example/</loc><lastmod>2025-09-17T22:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/jwt_tampering/</loc><lastmod>2025-09-17T21:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/asymmetric_encryption/</loc><lastmod>2025-09-14T00:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/symmetric_encryption/</loc><lastmod>2025-09-14T00:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/courses/cisc350/download-vmware/</loc><lastmod>2025-09-05T00:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/projects/music-classification/feature-engineering/</loc><lastmod>2025-06-13T22:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/projects/music-classification/data-prep/</loc><lastmod>2025-06-10T22:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/projects/music-classification/</loc><lastmod>2025-06-04T22:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/projects/music-classification/eda/</loc><lastmod>2025-06-04T22:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/posts/pipa-writeup/</loc><lastmod>2025-03-28T12:00:00+00:00</lastmod></url><url><loc>https://astar.fyi/posts/oswa-writeup/</loc><lastmod>2025-03-14T22:00:00+00:00</lastmod></url></urlset>