<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://sujaysraj.com/posts/intro-blog/</loc>
<lastmod>2025-06-12T04:15:00+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/posts/password-dictionary-attacks/</loc>
<lastmod>2025-07-15T09:15:00+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/posts/email-header-analysis/</loc>
<lastmod>2025-07-27T17:15:00+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/posts/telegram-bot/</loc>
<lastmod>2025-08-09T15:53:00+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/posts/distributed-AI-network/</loc>
<lastmod>2025-08-16T10:30:00+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/posts/static-analysis-beginner/</loc>
<lastmod>2025-08-25T17:18:13+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/posts/multi-nodal-phishing-agent/</loc>
<lastmod>2026-03-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/projects/</loc>
<lastmod>2026-03-19T11:34:43+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/malware-analysis/</loc>
<lastmod>2026-03-19T11:34:43+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/posts/</loc>
<lastmod>2026-03-19T11:34:43+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/about/</loc>
<lastmod>2026-03-19T11:34:43+00:00</lastmod>
</url>
<url>
<loc>https://sujaysraj.com/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/security-engineering/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/career-journey/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/technical-support/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/cryptography/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/password-security/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/ai/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/distributed-systems/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/digital-forensics/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/python/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/real-world-security/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/troubleshooting/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/attack-simulation/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/security-testing/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/email-forensics/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/threat-intelligence/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/security-automation/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/api-integration/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/ai-ml/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/system-architecture/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/webrtc/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/network-security/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/ai-integration/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/malware/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/static-analysis/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/pe/</loc>
</url>
<url>
<loc>https://sujaysraj.com/tags/reverse-engineering/</loc>
</url>
<url>
<loc>https://sujaysraj.com/categories/projects/</loc>
</url>
<url>
<loc>https://sujaysraj.com/categories/password-security/</loc>
</url>
<url>
<loc>https://sujaysraj.com/categories/security/</loc>
</url>
<url>
<loc>https://sujaysraj.com/categories/ai/</loc>
</url>
<url>
<loc>https://sujaysraj.com/categories/api/</loc>
</url>
<url>
<loc>https://sujaysraj.com/categories/network-security/</loc>
</url>
<url>
<loc>https://sujaysraj.com/categories/malware-analysis/</loc>
</url>
<url>
<loc>https://sujaysraj.com/googledbc954cb8173e16c.html</loc>
<lastmod>2026-03-19T11:34:19+00:00</lastmod>
</url>
</urlset>
