<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://blog.criticalthinkingpodcast.io/</loc>
    <lastmod>2026-04-03T23:10:38+00:00</lastmod>
  </url>
  <url>
    <loc>https://blog.criticalthinkingpodcast.io/subscribe</loc>
    <lastmod>2026-04-03T23:10:38+00:00</lastmod>
  </url>
      <url>
        <loc>https://blog.criticalthinkingpodcast.io/authors</loc>
        <lastmod>2026-04-03T23:10:38+00:00</lastmod>
      </url>
      <url>
        <loc>https://blog.criticalthinkingpodcast.io/authors/gr3pme</loc>
        <lastmod>2025-04-07</lastmod>
      </url>
      <url>
        <loc>https://blog.criticalthinkingpodcast.io/authors/yujilik</loc>
        <lastmod>2025-12-24</lastmod>
      </url>
      <url>
        <loc>https://blog.criticalthinkingpodcast.io/authors/critical-thinking-team</loc>
        <lastmod>2023-10-31</lastmod>
      </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-159-maximizing-bounties-on-google-cloud-vrp</loc>
      <lastmod>2026-02-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-94-zendesk-research</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-141-pwning-the-pod-google-docs-0-day-react-createelement-exploits-with-nick-copi-7urb</loc>
      <lastmod>2025-09-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-147-stupid-simple-hacking-workflow-tips</loc>
      <lastmod>2025-11-06</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-120-spaceraccoon-from-day-zero-to-zero-day</loc>
      <lastmod>2025-05-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-121-slonser-image-injection-0-day</loc>
      <lastmod>2025-05-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-164-tommy-devoss-from-black-hat-to-bug-bounty-legend</loc>
      <lastmod>2026-03-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-143-new-cohost-client-side-gadgets-lhe-meta-instant-global-admin-in-entra</loc>
      <lastmod>2025-10-10</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-156-cross-site-etag-leaks-ai-agents-from-whatsapp-and-bug-bounty-ama</loc>
      <lastmod>2026-01-08</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/useful-gadgets-when-bug-bounty-hunting</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-167-acquisition-hunting-supply-chain-bugs-research-theft-with-krevetk0</loc>
      <lastmod>2026-03-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-131-sl-cyber-writeups-metastrategy-orphaned-github-commits</loc>
      <lastmod>2025-07-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hn-54-white-box-formulas-vulnerable-coding-patterns-h1-bounty-gitlab-cve-ato-llm-attacks</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-90-5k-clickjacking-encryption-oracles-and-cursor-for-pocs</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-161-ai-workflows-csrf-despite-xfo-and-dtmf-exfil</loc>
      <lastmod>2026-02-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-165-protobuf-hacking-ai-powered-bug-hunting-and-self-improving-claude-workflows</loc>
      <lastmod>2026-03-12</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-99-back-to-the-basics-web-fundamental-to-100k-a-year-in-bug-bounty</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-97-bcrypt-hash-input-truncation-mobile-device-threat-modeling</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/css-injection-leaking-text-nodes-html-attributes</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hacking-the-planet</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep88-news-tools-writeups</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/bug-bounty-entrepreneurship</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-91-zero-to-lhe-in-9-months-feat-gr3pme</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-140-crit-research-lab-update-client-side-tricks-galore</loc>
      <lastmod>2025-09-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/bug-bounty-mental-practical-tips-for-staying-sharp-motivated</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep133-building-hacker-communities-bug-bounty-village-getdisclosed-and-the-lhe-squad-754d</loc>
      <lastmod>2025-08-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/jon-colston-mayonaise-bug-bounty-data-science</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/three-show-and-tell-bugs</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-129-is-this-how-bug-bounty-ends</loc>
      <lastmod>2025-07-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-144-google-s-top-ai-hackers-busfactor-and-monke</loc>
      <lastmod>2025-10-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-113-best-technical-takeaways-from-portswigger-top-10-2024</loc>
      <lastmod>2025-12-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-127-drama-pdf-as-js-chaos-bounty-profile-apps-and-more</loc>
      <lastmod>2025-06-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-148-mcp-hacking-guide</loc>
      <lastmod>2025-11-13</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-142-gr3pme-s-full-time-hunting-journey-update-insane-ai-research-and-some-light-news</loc>
      <lastmod>2025-10-03</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-73-sandboxed-iframes-waf-bypasses</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-151-client-side-advanced-topics-with-rhynorater</loc>
      <lastmod>2025-12-04</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-149-def-con-33-recap-wildcards-passkeys-dom-clobbering-and-more</loc>
      <lastmod>2025-11-20</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-116-auth-bypasses-and-google-vrp-writeups</loc>
      <lastmod>2025-04-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-109-creative-recon-alternative-techniques</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-130-minecraft-hacks-to-google-hacking-star</loc>
      <lastmod>2025-07-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hardware-hacking-bugbounty</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-114-single-page-application-hacking-playbook</loc>
      <lastmod>2025-03-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/seven-unsual-bugs-for-bug-bounty</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/abusing-iframes-from-a-client-side-hacker</loc>
      <lastmod>2025-04-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/frontend-language-oddities</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/nahamcon-csp-bypasses</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-150-asp-net-mvc-patterns-popping-oracle-identity-and-truly-lesser-known-subdomain-enu</loc>
      <lastmod>2025-11-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-123-vulnus-ex-machina-ai-hacking-part-2</loc>
      <lastmod>2025-05-23</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/portswigger-top-10-web-hacking-techniques-of-2023</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/how-to-generate-endless-attack-vectors-on-web-applications</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-103-getting-ansi-about-unicode-normalization</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-146-hacker-horror-stories</loc>
      <lastmod>2025-10-30</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-155-2026-hacker-goals-and-2025-recap</loc>
      <lastmod>2026-01-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-100-8-fav-bugs-of-2024-farewell-joel-hello-shift-cursor-of-hacking</loc>
      <lastmod>2025-04-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-122-we-won-google-s-ai-hacking-event-in-tokyo-main-takeaways</loc>
      <lastmod>2025-05-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-112-interview-with-monkehack-critical-lab-researcher-and-full-time-hunt</loc>
      <lastmod>2025-03-01</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-117-vulnus-ex-machina-ai-hacking-part-1</loc>
      <lastmod>2025-04-07</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/exploiting-net-remoting-cdn-attack-surface-recon-vs-main-app</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/team-82-sharon-brizinov-the-live-hacking-polymath</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep84-0xlupin-takeaways-googles-las-vegas-bugswat</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-104-2024-hacker-stats-2025-goals</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/ep78-reporting-efficiency-techniques</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-115-mentee-to-career-hacker-so-sakaguchi</loc>
      <lastmod>2025-03-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-158-charity-hack-along-technical-findings-and-writeup-analysis</loc>
      <lastmod>2026-01-22</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-136-hacking-cluely-ai-prod-sec-and-how-to-not-get-sued-with-jack-cable</loc>
      <lastmod>2025-08-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-168-client-side-path-traversals-across-every-framework-with-xssdoctor</loc>
      <lastmod>2026-04-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-118-hacking-happy-hour-0days-on-tap-and-sqli-shots</loc>
      <lastmod>2025-04-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-163-portswigger-top-10-web-hacking-techniques-of-2025</loc>
      <lastmod>2026-02-26</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/cookies-caching-attacking-chrome-extensions-with-matanber</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-157-kernel-driver-exploitation-mediatek-wi-fi-heap-overflow-to-root-shell-with-hypr</loc>
      <lastmod>2026-01-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-145-gr3pme-s-secret-bug-bounty-note-taking-methodology</loc>
      <lastmod>2025-10-24</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/practical-applications-defcon-32-web-research</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/ai-hacking-workflows-and-attacks</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-126-vulnus-ex-machina-part-3</loc>
      <lastmod>2025-06-16</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/new-post-6b9f</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-107-bypassing-cross-origin-browser-headers</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/bounty-landscape-iot-matt-brown</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-166-claude-code-skills-for-bug-bounty-when-why-and-how-to-build-them</loc>
      <lastmod>2026-03-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-134-xbow-ai-hacking-agent-and-human-in-the-loop-with-diego-jurado</loc>
      <lastmod>2025-08-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/jr0ch17-jasmin-landry-hacker-on-wallstreet</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-137-how-we-do-ai-assisted-whitebox-review-new-cspt</loc>
      <lastmod>2025-09-17</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernote-ep-125-how-to-win-live-hacking-events</loc>
      <lastmod>2025-06-09</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-162-hackerone-training-ai-on-bug-bounty-data</loc>
      <lastmod>2026-02-19</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/jason-haddix-returns</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hn-55-wordpress-plugins-common-design-flaws-code-review-methodology</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/client-side-ato-with-youssef-sammouda</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-153-hacking-the-robots-of-the-future-hardware-ai-and-bug-bounties-with-matt-brown</loc>
      <lastmod>2025-12-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/motivation-and-methodology-with-sam-curry</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/full-time-bug-bounty-blueprint</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-101-ai-attack-vectors-ctbb-hijacked-rez0-and-johann</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-124-balancing-bug-bounty-freedom-with-hacking-time</loc>
      <lastmod>2025-06-02</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep81-crushing-clientside-scope-matanber</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-111-how-to-bypass-dompurify-with-k-vin-mizu</loc>
      <lastmod>2025-02-21</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-152-geminijack-and-agentic-security-with-sasi-levi</loc>
      <lastmod>2025-12-11</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/program-manager-s-guide-to-running-a-successful-bug-bounty-program</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-138-caido-tools-and-workflows</loc>
      <lastmod>2025-09-18</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-132-archive-testing-methodology-with-mathias-karlsson</loc>
      <lastmod>2025-07-28</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-102-building-web-hacking-micro-agents-with-jason-haddix</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-105-best-moments-of-2024-on-the-pod</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/research-smuggling-payloads-in-well-known-data-types</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-71-vdp-chats-ai-bias-bounty-strats-keith-hoodlet</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/finding-high-impact-bugs</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-160-cloudflare-zero-days-mail-unsubscribing-for-xss</loc>
      <lastmod>2026-02-05</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-93-a-chat-with-dr-bouman-life-as-a-hacker-and-a-doctor</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-128-new-research-in-blind-ssrf-and-self-xss-and-how-to-architect-source-code-review</loc>
      <lastmod>2025-06-27</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/0-days-htmx-ss-with-mathias</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-66</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/supply-chain-attack-primer</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-110-oauth-gadget-correlation-and-common-attacks</loc>
      <lastmod>2025-02-14</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-69-johan-carlsson-3-month-checkin-fulltime-bug-bounty</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/live-hacking-event-inside-scoop-h1-305</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hn53-blind-xss-nahamsec-journey-500k</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/vdps-and-program-vs-hacker-debate</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-92-saml-xpath-confusion-chinese-dns-poisoning-and-ai-powered-403-bypasser</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hello-world</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep80-pwn2own-vs-h1-live-hacking-event-feat-sinsinology</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-106-announcing-our-new-co-host</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-154-starting-a-pentesting-company-on-top-of-bug-bounty</loc>
      <lastmod>2025-12-25</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep86-xcorrelation-frans-rce-research-drop</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/p/hackernotes-ep-76-match-replace-http-proxies-underrated-feature</loc>
      <lastmod>2025-04-15</lastmod>
      <priority>1.0</priority>
    </url>
    <url>
      <loc>https://blog.criticalthinkingpodcast.io/c/how-to-run-a-bug-bounty-program</loc>
      <lastmod>2024-12-03</lastmod>
      <priority>1.0</priority>
    </url>
</urlset>