<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 4, 2026 at 12:37 am by All in One SEO v4.9.4.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://blog.hackerinthehouse.in/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>HITH Blog - Hackerinthehouse</title>
		<link><![CDATA[https://blog.hackerinthehouse.in]]></link>
		<description><![CDATA[HITH Blog - Hackerinthehouse]]></description>
		<lastBuildDate><![CDATA[Wed, 16 Aug 2023 14:04:34 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://blog.hackerinthehouse.in/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/network-security-principles/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/network-security-principles/]]></link>
			<title>Network Security Principles</title>
			<pubDate><![CDATA[Wed, 16 Aug 2023 14:04:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/?page_id=3373]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/?page_id=3373]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Tue, 21 Mar 2023 13:33:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/]]></link>
			<title>Homepage</title>
			<pubDate><![CDATA[Wed, 26 Jun 2024 17:36:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/quantum-computing/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/quantum-computing/]]></link>
			<title>Is Quantum Computing the future of Computing?</title>
			<pubDate><![CDATA[Wed, 16 Aug 2023 10:41:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/why-grc-services-are-vital-for-business-growth-and-compliance-in-2025/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/why-grc-services-are-vital-for-business-growth-and-compliance-in-2025/]]></link>
			<title>Why GRC Services Are Vital for Business Growth and Compliance in 2025</title>
			<pubDate><![CDATA[Tue, 01 Jul 2025 07:39:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/about-us/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/about-us/]]></link>
			<title>About us</title>
			<pubDate><![CDATA[Wed, 26 Jun 2024 07:18:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/?mailpoet_page=captcha]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/?mailpoet_page=captcha]]></link>
			<title>MailPoet Page</title>
			<pubDate><![CDATA[Wed, 18 Dec 2024 09:43:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/robotic-process-automation/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/robotic-process-automation/]]></link>
			<title>Robotic Process Automation: The Key to Effortless Efficiency</title>
			<pubDate><![CDATA[Thu, 19 Sep 2024 04:29:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/privileged-escalation/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/privileged-escalation/]]></link>
			<title>Privileged Escalation: How Hackers Exploit Permissions to Compromise Your Systems</title>
			<pubDate><![CDATA[Tue, 05 Mar 2024 05:16:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/attack-surface-scanning/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/attack-surface-scanning/]]></link>
			<title>Ultimate Guide to Attack Surface Scanning</title>
			<pubDate><![CDATA[Thu, 10 Apr 2025 05:41:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/phishing-unmasked/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/phishing-unmasked/]]></link>
			<title>Phishing Unmasked</title>
			<pubDate><![CDATA[Wed, 23 Aug 2023 10:22:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/a-comprehensive-guide-to-security-compliance/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/a-comprehensive-guide-to-security-compliance/]]></link>
			<title>A Comprehensive Guide to Security Compliance</title>
			<pubDate><![CDATA[Thu, 10 Apr 2025 05:35:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/cryptography/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/cryptography/]]></link>
			<title>A guide on Cryptography</title>
			<pubDate><![CDATA[Tue, 19 Sep 2023 06:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/the-limits-of-ai-in-cybersecurity/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/the-limits-of-ai-in-cybersecurity/]]></link>
			<title>The Limits of AI in Cybersecurity: Why Devin the Coding Marvel Can&#8217;t Go It Alone</title>
			<pubDate><![CDATA[Tue, 19 Mar 2024 09:58:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/red-team-vs-blue-team/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/red-team-vs-blue-team/]]></link>
			<title>The Cyber battle between Red Team vs Blue Team</title>
			<pubDate><![CDATA[Tue, 06 Feb 2024 06:56:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/the-ultimate-guide-to-vulnerability-scanning/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/the-ultimate-guide-to-vulnerability-scanning/]]></link>
			<title>The Ultimate Guide to Vulnerability Scanning</title>
			<pubDate><![CDATA[Thu, 14 Dec 2023 08:13:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/the-crucial-role-of-persistence-in-red-teaming/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/the-crucial-role-of-persistence-in-red-teaming/]]></link>
			<title>The crucial role of persistence in red teaming</title>
			<pubDate><![CDATA[Sun, 31 Mar 2024 07:17:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/a-comprehensive-guide-to-apt/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/a-comprehensive-guide-to-apt/]]></link>
			<title>A Comprehensive Guide to APT</title>
			<pubDate><![CDATA[Sun, 10 Mar 2024 06:55:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/top-10-tools-for-real-world-red-teaming/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/top-10-tools-for-real-world-red-teaming/]]></link>
			<title>Top 10 Tools for Real World Red Teaming</title>
			<pubDate><![CDATA[Sat, 18 Nov 2023 07:14:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/locking-down-oauth-2-0/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/locking-down-oauth-2-0/]]></link>
			<title>Locking Down OAuth 2.0: Critical Steps to Protect User Accounts and Data</title>
			<pubDate><![CDATA[Sat, 11 Nov 2023 15:03:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/a-peek-into-facial-recognition-technology/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/a-peek-into-facial-recognition-technology/]]></link>
			<title>A Peek into Facial Recognition Technology</title>
			<pubDate><![CDATA[Mon, 21 Aug 2023 11:11:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/contact-us/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Mon, 10 Jun 2024 03:57:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/firewall-in-network-security/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/firewall-in-network-security/]]></link>
			<title>Firewall in Network Security</title>
			<pubDate><![CDATA[Fri, 18 Aug 2023 13:48:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/bci-merging-minds-with-machines/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/bci-merging-minds-with-machines/]]></link>
			<title>BCI: Merging Minds With Machines</title>
			<pubDate><![CDATA[Fri, 18 Aug 2023 08:27:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/cyber-security-services-vs-cyber-security-products/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/cyber-security-services-vs-cyber-security-products/]]></link>
			<title>A Comprehensive Guide on Cyber Security Services VS Cyber Security Products</title>
			<pubDate><![CDATA[Fri, 14 Jun 2024 05:53:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/managed-endpoint-detection-response-guide-cybersecurity/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/managed-endpoint-detection-response-guide-cybersecurity/]]></link>
			<title>Unveiling MEDR: A Comprehensive Guide to Enhancing Cybersecurity</title>
			<pubDate><![CDATA[Tue, 15 Aug 2023 11:00:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/two-factor-authentication/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/two-factor-authentication/]]></link>
			<title>A guide to Two-Factor Authentication: Enhancing Your Online Security</title>
			<pubDate><![CDATA[Tue, 15 Aug 2023 08:48:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/a-beginners-guide-to-active-directory-penetration-testing/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/a-beginners-guide-to-active-directory-penetration-testing/]]></link>
			<title>A Beginner&#8217;s guide to Active Directory Penetration Testing</title>
			<pubDate><![CDATA[Wed, 21 Jun 2023 15:24:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/detailed-guide-on-password-transmutations/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/detailed-guide-on-password-transmutations/]]></link>
			<title>Detailed guide on Password Transmutations</title>
			<pubDate><![CDATA[Sat, 29 Apr 2023 12:23:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/write/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/write/]]></link>
			<title>Write</title>
			<pubDate><![CDATA[Mon, 14 Aug 2023 15:07:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/how-to-find-dom-based-xss-vulnerability/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/how-to-find-dom-based-xss-vulnerability/]]></link>
			<title>How To Find DOM-based XSS Vulnerability</title>
			<pubDate><![CDATA[Mon, 14 Aug 2023 06:12:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/journey-to-website-security-uncovering-hyperlink-injection-dangers/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/journey-to-website-security-uncovering-hyperlink-injection-dangers/]]></link>
			<title>Journey to Website Security: Uncovering Hyperlink Injection Dangers</title>
			<pubDate><![CDATA[Mon, 14 Aug 2023 06:12:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/a-detailed-guide-to-osint/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/a-detailed-guide-to-osint/]]></link>
			<title>A detailed guide to OSINT</title>
			<pubDate><![CDATA[Fri, 14 Apr 2023 15:23:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/what-is-origin-ip/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/what-is-origin-ip/]]></link>
			<title>Concept behind Origin IP and how to find it?</title>
			<pubDate><![CDATA[Thu, 13 Apr 2023 14:38:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/privacy-policy/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Thu, 13 Apr 2023 12:29:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/terms/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/terms/]]></link>
			<title>Terms</title>
			<pubDate><![CDATA[Thu, 13 Apr 2023 12:09:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/services/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/services/]]></link>
			<title>Services</title>
			<pubDate><![CDATA[Wed, 15 Mar 2023 08:22:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/registration-3/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/registration-3/]]></link>
			<title>Registration</title>
			<pubDate><![CDATA[Thu, 09 Feb 2023 12:33:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/modern-defensive-cybersecurity-services/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/modern-defensive-cybersecurity-services/]]></link>
			<title>Modern Defensive Cybersecurity Services</title>
			<pubDate><![CDATA[Sun, 29 Dec 2024 06:35:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/debugging-techniques-for-exploit-development/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/debugging-techniques-for-exploit-development/]]></link>
			<title>Debugging Techniques for Exploit Development</title>
			<pubDate><![CDATA[Sun, 26 Feb 2023 06:48:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/application-security-and-its-types/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/application-security-and-its-types/]]></link>
			<title>Application Security and its types</title>
			<pubDate><![CDATA[Fri, 24 Feb 2023 08:03:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/security-governance-explained/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/security-governance-explained/]]></link>
			<title>Security Governance explained</title>
			<pubDate><![CDATA[Fri, 10 Mar 2023 11:11:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/file-upload-xss/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/file-upload-xss/]]></link>
			<title>File Upload XSS | Find XSS in a different way while doing Bug bounty and Pentesting</title>
			<pubDate><![CDATA[Fri, 10 Mar 2023 08:23:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/xss-cheat-sheet/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/xss-cheat-sheet/]]></link>
			<title>XSS Cheat Sheet</title>
			<pubDate><![CDATA[Fri, 10 Mar 2023 08:14:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/building-an-xss-scanner-with-python/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/building-an-xss-scanner-with-python/]]></link>
			<title>Building an XSS Scanner with Python</title>
			<pubDate><![CDATA[Fri, 10 Mar 2023 07:58:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/default-user-group-3/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/default-user-group-3/]]></link>
			<title>Default User Group</title>
			<pubDate><![CDATA[Thu, 09 Feb 2023 12:33:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/submit-new-blog-post-3/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/submit-new-blog-post-3/]]></link>
			<title>Submit New Blog Post</title>
			<pubDate><![CDATA[Thu, 09 Feb 2023 12:33:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/user-blogs-3/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/user-blogs-3/]]></link>
			<title>User Blogs</title>
			<pubDate><![CDATA[Thu, 09 Feb 2023 12:33:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/pentest-vapt-roe-and-best-practices/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/pentest-vapt-roe-and-best-practices/]]></link>
			<title>Pentest/VAPT RoE and Best Practices</title>
			<pubDate><![CDATA[Sat, 04 Feb 2023 06:07:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.hackerinthehouse.in/recent-trends-in-zero-trust-architecture/]]></guid>
			<link><![CDATA[https://blog.hackerinthehouse.in/recent-trends-in-zero-trust-architecture/]]></link>
			<title>Recent Trends in Zero Trust Architecture</title>
			<pubDate><![CDATA[Mon, 03 Mar 2025 08:07:41 +0000]]></pubDate>
		</item>
				</channel>
</rss>
