<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://atbabers.com/</loc></url>
<url><loc>https://atbabers.com/agent-hooks</loc></url>
<url><loc>https://atbabers.com/blog</loc></url>
<url><loc>https://atbabers.com/resources-old</loc></url>
<url><loc>https://atbabers.com/projects</loc></url>
<url><loc>https://atbabers.com/resource-old</loc></url>
<url><loc>https://atbabers.com/blog/soc-2-survival-guide-how-to-prepare-your-company-for-a-stress-free-audit</loc></url>
<url><loc>https://atbabers.com/blog/coordinated-attack-detection-maximal-clique-enumeration-with-caching</loc></url>
<url><loc>https://atbabers.com/blog/detecting-unusual-url-sequences-in-cloudflare-logs-using-markov-chains-and-caching</loc></url>
<url><loc>https://atbabers.com/blog/detecting-c2-beaconing-in-vpc-flow-logs-with-pythonic-periodicity-check</loc></url>
<url><loc>https://atbabers.com/blog/alert-thresholding</loc></url>
<url><loc>https://atbabers.com/blog/analyzing-schema-duplication</loc></url>
<url><loc>https://atbabers.com/blog/ddlc-threat-modeling</loc></url>
<url><loc>https://atbabers.com/blog/ddlc-triage</loc></url>
<url><loc>https://atbabers.com/blog/ddlc-discovery</loc></url>
<url><loc>https://atbabers.com/blog/ddlc-overview</loc></url>
<url><loc>https://atbabers.com/blog/the-3cs-of-detection-engineering</loc></url>
<url><loc>https://atbabers.com/blog/done-is-not-enough</loc></url>
<url><loc>https://atbabers.com/blog/detection-engineering-program-evaluation</loc></url>
<url><loc>https://atbabers.com/blog/authac</loc></url>
</urlset>