<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://blog.tobyjackson.io/ai/a-failed-experiment/</loc><lastmod>2026-03-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/ai/</loc><lastmod>2026-03-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/</loc><lastmod>2026-03-20T00:00:00+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/ai/</loc><lastmod>2026-03-02T00:00:00+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/</loc><lastmod>2026-03-02T00:00:00+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/ai/where-are-we-going-from-here/</loc><lastmod>2026-03-02T00:00:00+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/blog/</loc><lastmod>2026-01-04T00:00:00+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/what-makes-a-senior-pentester/</loc><lastmod>2026-01-04T00:00:00+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/</loc><lastmod>2026-01-04T00:00:00+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/active-directory/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/active-directory/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/active-directory-certificate-services/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/active-directory-certificate-services/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/adcs/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/adcs/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/capture-the-flag/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/capture-the-flag/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/ctf/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/ctf/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/esc11/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/esc11/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/exploiting-active-directory-certificate-services-esc11-walkthrough/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/hacking/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/hacking/</loc><lastmod>2023-03-24T18:37:30+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/10-things-i-learnt-in-my-first-year-as-a-penetration-tester/</loc><lastmod>2022-12-31T22:31:26+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/cyber-security/</loc><lastmod>2022-12-31T22:31:26+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/cybersecurity/</loc><lastmod>2022-12-31T22:31:26+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/hack-the-box/</loc><lastmod>2022-12-31T22:31:26+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/penetration-testing/</loc><lastmod>2022-12-31T22:31:26+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/pentester/</loc><lastmod>2022-12-31T22:31:26+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/cyber-security/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/guide/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/guide/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/hack-the-box/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/hack-the-box-walkthroughs-hathor/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/hackthebox/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/hackthebox/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/hacktheboxwriteup/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/hacktheboxwriteup/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/htb/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/htb/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/penetration-testing/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/walkthrough/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/walkthrough/</loc><lastmod>2022-11-19T18:06:04+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/automating-the-creation-of-vulnerable-active-directory-labs-with-terraform-how-terra-fying/</loc><lastmod>2022-05-11T21:40:03+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/cybersecurity/</loc><lastmod>2022-05-11T21:40:03+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/devops/</loc><lastmod>2022-05-11T21:40:03+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/devops/</loc><lastmod>2022-05-11T21:40:03+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/internal/</loc><lastmod>2022-05-11T21:40:03+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/internal/</loc><lastmod>2022-05-11T21:40:03+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/secdevops/</loc><lastmod>2022-05-11T21:40:03+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/secdevops/</loc><lastmod>2022-05-11T21:40:03+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/categories/windows/</loc><lastmod>2022-05-11T21:40:03+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/tags/windows/</loc><lastmod>2022-05-11T21:40:03+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/hack-the-box-walkthrough-anubis-using-sliverc2/</loc><lastmod>2022-05-06T19:20:46+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/kerberos-fundamentals/</loc><lastmod>2022-05-04T15:15:13+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/zeropointsecurity-certified-red-team-operator-crto-course-a-comprehensive-review/</loc><lastmod>2022-02-09T12:38:53+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/pnpt-practical-network-penetration-tester-course-review-2022/</loc><lastmod>2022-01-25T23:30:01+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/osep-review-2021-offensive-security-experienced-pentester/</loc><lastmod>2021-12-02T15:30:28+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/insecure-deserialization-what-is-it-and-how-do-you-exploit-it/</loc><lastmod>2021-06-30T23:08:32+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/creating-a-home-active-directory-red-team-lab/</loc><lastmod>2021-06-23T18:11:18+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/discovering-wordpress-plugin-yop-polls-v6-2-7-stored-xss/</loc><lastmod>2021-06-17T16:06:44+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/blog/wpdevart-polls-blind-sql-injection/</loc><lastmod>2021-06-10T16:19:05+00:00</lastmod></url><url><loc>https://blog.tobyjackson.io/about/</loc></url><url><loc>https://blog.tobyjackson.io/research/</loc></url></urlset>