<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://sayyidishaarani.com/</loc></url>
<url><loc>https://sayyidishaarani.com/inspection/</loc></url>
<url><loc>https://sayyidishaarani.com/about/</loc></url>
<url><loc>https://sayyidishaarani.com/boundaries/</loc></url>
<url><loc>https://sayyidishaarani.com/disclosure/</loc></url>
<url><loc>https://sayyidishaarani.com/notes/</loc></url>
<url><loc>https://sayyidishaarani.com/notes/authorization-and-scope-checklist-before-security-inspection/</loc></url>
<url><loc>https://sayyidishaarani.com/notes/automated-vulnerability-scanning-what-it-can-and-cannot-do/</loc></url>
<url><loc>https://sayyidishaarani.com/notes/how-to-prioritize-security-findings-after-an-inspection/</loc></url>
<url><loc>https://sayyidishaarani.com/notes/security-reporting-evidence-based-findings-vs-raw-tool-output/</loc></url>
<url><loc>https://sayyidishaarani.com/notes/remediation-verification-security-closure-criteria-that-work/</loc></url>
<url><loc>https://sayyidishaarani.com/notes/when-to-re-inspect-trigger-based-security-timing-guide/</loc></url>
<url><loc>https://sayyidishaarani.com/notes/structured-inspection-vs-adversarial-simulation-key-differences/</loc></url>
<url><loc>https://sayyidishaarani.com/notes/why-security-visibility-must-come-before-scale/</loc></url>
<url><loc>https://sayyidishaarani.com/notes/using-owasp-top-10-in-a-structured-inspection-workflow/</loc></url>
</urlset>