<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.intruder.io</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/acunetix</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/api-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/platform/attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/automated-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/cspm/aws</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/cspm/azure</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/cloud-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/contact</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/legal/data-processing-agreement</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/detectify</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/partners/drata-integration</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/compliance</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/external-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/cspm/google-cloud</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/vulnerability-management-reporting</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/internal-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/compliance/iso-27001</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/netsparker</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/network-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/compliance/pci</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/pentest-tools-com</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/privacy</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/qualys</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/rapid7</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/sitemap</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/compliance/soc-2</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/success-stories</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/partners</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/legal/terms</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/the-intruder-service</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/partners/vanta-integration</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/dast</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/website-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/penetration-testing/web-application-penetration-testing-service</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/platform/integrations</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/external-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/downloads</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/asset-discovery</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/get-demo</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/platform/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/compliance/hipaa</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/website-security/wordpress</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/sharepoint-toolshell-vulnerability-scanner</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/emerging-threat-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/risk-based-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/cspm</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/attack-surface-monitoring</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/platform/ai-security-analyst</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/platform/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/press</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/watchtowr</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/cycognito</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/assetnote</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/roboshadow</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/censys</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/outpost24</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/runzero</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/ionix</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/aikido</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/wiz</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/aws-inspector</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/secrets-detection</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/about-us</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/container-image-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/appcheck</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/compare/immuniweb</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/home-copy</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/pricing</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/ctem</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/cloud-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/use-cases/shadow-it-discovery</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/platform/ai-pentesting</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/solution-template</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/20-cyber-leaders-to-follow-on-linkedin</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/200-000-websites-still-affected-by-three-year-old-security-weakness-heartbleed</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/2023-deloitte-technology-fast-50</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/5-network-security-threats-and-how-to-protect-yourself</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/9-minutes-to-breach-the-life-expectancy-of-an-unsecured-mongodb-honeypot</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/agent-based-vs-network-based-internal-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/ai-pentesting-the-depth-of-a-pentest-on-demand</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/announcing-authenticated-web-application-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/announcing-changes-to-our-essential-plan</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/apache-struts-remote-code-execution-cve-2017-5638</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/api-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/asset-discovery-tools</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/attack-surface-management-tools</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/attack-surface-management-vs-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/aws-cloud-security-explained-whats-left-exposed</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/aws-security-services</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/azure-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/badlock-vulnerability-pre-release-analysis</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/better-together-nuclei-and-tenable</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/celebrating-the-best-of-intruder-from-2023</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/claude-intruder-mcp</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/clawdbot-when-easy-ai-becomes-a-security-nightmare</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cloud-cybersecurity-expo-recap</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cloud-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/compliance-frameworks-customer-trust</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/container-registry-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cpanel-auth-bypass-into-rce-on-a-million-plus-internet-facing-hosts-cve-2026-41940</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/critical-rdp-flaw-leaves-up-to-2-3-million-servers-exposed-cve-2019-0708</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/curl-high-rated-cve-2023-38545</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cve-2024-24919-check-point-security-gateways-vulnerability-explained</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cve-2024-3400-palo-alto-global-protect-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cve-trends-alternative</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cyber-insurance-guide-for-small-businesses</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cyber-security-7-top-tips-for-smes</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cyber-security-stats-and-facts-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cyber-security-trends</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/cybersecurity-tools</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/days-of-cyber-whats-an-sme-to-do-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/devsecops-best-practices</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/does-the-owasp-top-10-still-matter</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/drown-vulnerability-more-like-a-doggy-paddle</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/epss-vs-cvss</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/essential-guide-to-cybersecurity-compliance</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/expanding-our-pricing-plans-a-design-story-of-villains-heroes-and-gregomon</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/find-your-assets-before-the-hackers-do</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/focus-on-what-matters-most-exposure-management-and-your-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/g2-best-software-awards-2023</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/getting-started-with-security-testing-practical-guide</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/ghost-cves-the-vulnerabilities-you-dont-know-about-yet</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/google-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/gotta-catch-em-all-bug-hunting-explained</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/greg-ai-security-analyst</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/hacking-the-entire-internet-just-got-easier</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-bad-is-the-citrixbleed-vulnerability-cve-2023-4966</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-basic-failings-in-apis-cause-breaches</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-intruder-supports-your-compliance-journey-frameworks-and-criteria</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-much-does-penetration-testing-cost</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-often-should-i-scan</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-serious-are-the-intel-meltdown-spectre-flaws</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-to-build-a-resilient-remote-working-business</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-to-catch-people-using-ai-during-interviews</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-to-keep-on-top-of-emerging-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-to-perform-a-vulnerability-assessment-step-by-step</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-to-protect-yourself-against-phishing</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/how-to-secure-the-kubernetes-api-behind-a-vpn</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/im-a-startup-what-should-i-do-about-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/improved-attack-surface-discovery</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/insight-how-will-generative-ai-impact-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/internal-vs-external-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/interview-with-chris-wallis</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/introducing-bits-a-glimpse-into-intruders-design-evolution</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/introducing-container-image-scanning-no-agents--no-blind-spots</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/introducing-fully-informed-api-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/intruder-joins-google-cloud-partner-advantage</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/intruder-launches-api-scanning-for-enhanced-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/intruder-launches-continuous-attack-surface-monitoring-to-reduce-exposure</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/intruder-simplifies-security-compliance-operations-through-integration-with-drata</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/intruder-vulnerability-bulletin-cisco-ike-vulnerability-benigncertain</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/intruder-vulnerability-bulletin-dirty-cow-privilege-escalation</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/intruder-vulnerability-bulletin-mysql-privilege-escalation-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/intruder-vulnerability-bulletin-phpmailer-code-execution-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/intruder-vulnerability-bulletin-phpmailer-swiftmailer-zendframework-code-execution</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/is-your-web-browser-secretly-mining-bitcoins</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/iso-27001-compliance-your-essential-guide</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/ivanti-epmm-another-day-another-pre-auth-rce-cve-2026-1281-cve-2026-1340</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/just-how-bad-is-the-cisco-ios-xe-zero-day-vulnerability-cve-2023-20198</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/just-how-serious-is-the-robot-attack</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/key-takeaways-from-m-trends-2023</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/log4shell-cve-2021-44228-what-it-is-and-how-to-detect-it</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/memcached-code-execution-vulnerabilities-intruder-vulnerability-bulletin</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/metrics-matter-why-weve-added-analytics-to-show-your-progress</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/midmarket-security-gap-middle-child</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/mind-the-gap-how-to-ensure-your-vulnerability-detection-methods-are-up-to-scratch</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/moving-vulnerability-management-from-chaos-to-confidence</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/ncsc-web-check-is-retiring-heres-your-simple-modern-alternative</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/network-penetration-testing-beginners-guide</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/openvas-vs-nessus</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/patch-now-is-looney-tunables-as-bad-as-everyone-says</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/penetration-testing-vs-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/penetration-testing-your-aws-environment-a-ctos-guide</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/pentesting-tools</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/petya-or-notpetya-why-is-ms17-010-still-not-patched</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/private-bug-bounty-finding-the-needle-in-the-haystack</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/product-update-continuous-network-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/progress-moveit-vulnerability-cve-2024-5806-all-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/rapid-response-bridge-the-gap-to-find-exploits-faster</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/registry-vs-runtime-where-to-scan-your-container-images</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/reporting-to-the-board-how-to-talk-about-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/security-compliance-101</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/security-update-openssl-critical-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/should-the-data-on-my-server-be-encrypted</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/single-page-applications-why-do-you-need-to-scan-them</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/smbghost-strange-smb-vulnerability-disclosures-and-wannacry-2-0</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/soc-2-compliance-102-with-intruder-and-drata</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/soc-2-compliance-an-essential-guide</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/spring4shell-cve-2022-22965</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/streamlining-the-chaos-of-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/team-xball-ddos-extortion-hoax</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-battle-for-iot-security-has-already-been-lost</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-cloud-isnt-secure-by-default-what-containers-changed-about-risk</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-importance-of-vulnerability-scanning-for-soc-2-audits</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-norwegian-government-hacked-my-startup</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-state-of-the-cybersecurity-stack</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-top-vulnerability-scanning-tools</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-vulnerabulletin-issue-1</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-vulnerabulletin-issue-2</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-vulnerabulletin-issue-3</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-vulnerabulletin-issue-4</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-vulnerabulletin-issue-5</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/the-vulnerabulletin-issue-6</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/top-api-security-tools</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/top-dast-tools</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/top-online-port-scanners</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/top-saas-cybersecurity-threats</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/top-vulnerabilities-2025</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/types-of-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/user-enumeration-in-microsoft-products-an-incident-waiting-to-happen</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/validate-and-remediate-faster-with-in-platform-commenting</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/venom-explained</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/vulnerability-assessment-reporting-beginners-guide</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/vulnerability-management-metrics</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/vulnerability-management-program</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/vulnerability-management-tools</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/vulnerability-scanner-for-linux</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/vulnerability-scanner-for-windows</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/vulnerability-scanning-frequency-best-practices</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/web-application-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/web-application-security-testing-essential-guide</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/what-are-fake-clickjacking-bug-bounty-reports</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/what-is-an-external-pentest</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/what-is-an-internal-pen-test</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/what-is-exposure-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/what-is-nuclei-vulnerability-scanner</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/what-is-penetration-testing-the-ultimate-guide</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/what-is-the-openssh-regresshion-vulnerability-cve-2024-6387</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/what-is-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/what-is-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/what-your-security-and-trust-program-needs-to-look-like-in-2026</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/whats-new-product-updates-from-intruder-april-2024</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/whats-new-product-updates-from-intruder-february-2024</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/whats-new-product-updates-from-intruder-july-2024</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/whats-new-product-updates-from-intruder-november-2023</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/whats-new-product-updates-from-intruder-october-2024</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/whats-new-product-updates-july-2023</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/whats-new-product-updates-may-2023</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/whats-new-product-updates-september-2023</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/whats-the-point-in-phishing-assessments</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/why-attack-surface-reduction-is-your-first-line-of-defense</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/why-new-navigation-has-improved-our-user-experience</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/why-you-need-continuous-network-monitoring</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog/xz-utils-cve-2024-3094</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/adam-oliver</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/andy-hornegold</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/ashley-hyman</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/ben-toms</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/benjamin-marr</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/cale-anderson</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/camilla-perselli</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/charlie-fleetham</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/charlie-yianni</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/chris-wallis</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/christian-gonzalez</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/courtney-de-winter</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/dan-andrew</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/dane-vallejo</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/daniel-thatcher</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/dann-moore</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/darragh-osullivan</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/david-koke</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/david-robinson</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/eamon-carroll</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/hannah-payne</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/hannah-payne-2</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/ian-byrne</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/jack-mcdonach</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/james-harrison</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/james-harrison-2</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/james-harrison-3</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/jen-guglielmi</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/joe-haigh</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/lars-greiwe</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/lefteris-nikoltsios</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/manuel-morejon</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/marc-rubbinaccio</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/nika-vizintin-prinz</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/nikki-francis</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/olya-osiagina</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/patrick-craston</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/pratik-bhat</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/sam-pizzey</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/tom-hoskin</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/author/will</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/success-stories/british-red-cross-training</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/success-stories/how-brainlabs-stays-ahead-of-a-rapidly-changing-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/success-stories/how-hill-smith-holdings-plc-achieved-comprehensive-vulnerability-management-with-intruder-vanguard</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/success-stories/how-intruder-helps-litmus-automate-their-network-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/success-stories/how-intruder-helps-ravelin-meet-compliance-requirements-and-gain-customer-trust</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/success-stories/how-surveil-used-intruder-to-improve-their-security-posture</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/success-stories/how-yembo-turned-security-from-roadblock-to-growth-driver</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/broken-authorization-apis-autoswagger</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/cve-2025-30406-gladinet-centrestack</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/from-enterprise-chatbots-to-gooner-caves-exposed-ai-infrastructure-is-rampant</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/in-guid-we-trust</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/path-traversal-and-code-execution-in-csla-net-cve-2024-28698</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/practical-http-header-smuggling</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/secrets-detection-javascript</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/server-side-prototype-pollution</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/shadow-it-risks</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/simple-bugs-in-saml-apps---oracle-commerce-cloud</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/split-second-dns-rebinding-in-chrome-and-safari</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/the-state-of-agentic-ai-in-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/vibe-coding-security-risks</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/research/we-hacked-ourselves-with-dns-rebinding</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/api-security-how-basic-failings-cause-breaches</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/attack-surface-management-find-your-assets-before-attackers-do</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/focus-on-what-matters-most-exposure-management-and-your-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/mastering-cloud-defense-insights-into-protecting-dynamic-environments</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/office-hours-webinar</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/office-hours-webinar-june-2023</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/office-hours-with-intruder-april-update</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/office-hours-with-intruder-july-update</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/office-hours-with-intruder-october-update</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/product-update-webinar-highlight-on-analytics-november-2023</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/product-update-webinar-highlight-on-attack-surface-management-january-2024</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/product-update-webinar-highlight-on-integrations</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/security-compliance-101</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/webinars/security-compliance-102-drata-intruder</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/application-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/compliance</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/devops-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/guides</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/insights</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/news</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/our-reports</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/product</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/vulnerabilities-and-threats</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/blog-categories/vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/product/owasp-top-10-vulnerability-scanner</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/product/php-vulnerability-scanner</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/product/sql-injection-scanner</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/product/vulnerability-assessment-software</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/product/xss-scanner</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/advanced-persistent-threat-apt</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/application-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/attack-surface</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/attack-surface-reduction-asr</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/authenticated-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/automated-security-testing</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/blue-team</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/brute-force-attack</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/container-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/credentialed-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/cve</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/cyber-configuration-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/cyber-hygiene</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/cyber-threat-modelling</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/cybersecurity-maturity</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/cybersecurity-posture</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/devsecops</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/epss</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/ethical-hacking</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/external-attack-surface-management-easm</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/identity-and-access-management-iam</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/local-file-inclusion-lfi</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/multi-factor-authentication-mfa</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/patch-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/red-team</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/remote-code-execution-rce</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/risk-based-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/secrets-detection</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/shadow-it</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/shift-left-security</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/siem</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/single-page-application-spa</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/tactics-techniques-and-procedures-ttps</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/web-application-firewall-waf</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-an-exploit</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-asset-discovery</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-cnapp</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-cross-site-request-forgery</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-ctem</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-cvss</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-cwe</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-dast</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-malware</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-nist</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-owasp</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-personally-identifiable-information-pii</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-ransomware</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-single-sign-on-sso</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-sql-injection</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-subdomain-takeover</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-udp-port-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/what-is-xss-cross-site-scripting</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/glossary/zero-day-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/landing/automated-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/downloads/attack-surface-management-pdf</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/downloads/exposure-management-index</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/downloads/guide-to-vulnerability-scanning</loc>
    </url>
    <url>
        <loc>https://www.intruder.io/downloads/security-middle-child-report</loc>
    </url>
</urlset>