<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://a6z.co</loc>
    <lastmod>2026-04-07T21:18:52.673Z</lastmod>
    <changefreq>always</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://a6z.co/lessons-from-a-live-hacking-event</loc>
    <lastmod>2022-12-25T09:17:54.991Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/exploiting-exposed-spring-boot-heapdump-endpoint</loc>
    <lastmod>2022-10-02T16:38:17.843Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/learning-how-to-hack-aem-web-apps</loc>
    <lastmod>2021-11-06T17:52:22.536Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/testing-password-reset-functions</loc>
    <lastmod>2021-06-13T18:26:40.865Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/what-is-idn-homograph-attack</loc>
    <lastmod>2021-01-30T11:53:50.131Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/code-your-own-port-scanner-using-python</loc>
    <lastmod>2021-01-26T07:51:23.752Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/understanding-gas-in-ethereum</loc>
    <lastmod>2021-01-23T15:33:24.123Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/how-i-accidentally-found-my-first-bug</loc>
    <lastmod>2021-01-16T12:01:23.410Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/why-do-we-need-ethereum-20</loc>
    <lastmod>2021-01-13T17:23:52.051Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/understanding-hash-cryptography-in-blockchains-part-2-five-requirements-of-a-cryptographic-hash-function</loc>
    <lastmod>2021-01-07T17:32:44.349Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/understanding-hash-cryptography-in-blockchains-part-1</loc>
    <lastmod>2021-01-02T07:37:16.083Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/blockchain-in-five-minutes</loc>
    <lastmod>2020-12-22T17:52:24.847Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://a6z.co/archive</loc>
    <lastmod>2026-04-07T21:18:52.673Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://a6z.co/recommendations</loc>
    <lastmod>2026-04-07T21:18:52.673Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.4</priority>
  </url>
</urlset>