<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://rojosecurity.com/2026/01/22/gestion-de-vulnerabilidades-pt-0/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2026/01/gestiondevulnerabilidadesimg.jpeg</image:loc><image:title>gestiondevulnerabilidadesimg</image:title></image:image><lastmod>2026-01-22T19:54:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2026/01/07/logging-y-visibilidad-1-pt-2-autenticacion/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2026/01/blueteamlinuxpt2.png</image:loc><image:title>BlueTeamLinuxPT2</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2026/01/losgsshjournal.png</image:loc><image:title>losgSSHJournal</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2026/01/ataquebruteforcessh.png</image:loc><image:title>ataqueBruteforceSSH</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2026/01/bruteforcescript.png</image:loc><image:title>BruteForceScript</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2026/01/victimaatacante.png</image:loc><image:title>VictimaAtacante</image:title></image:image><lastmod>2026-01-14T16:04:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2026/01/02/blueteam-linux-logging-y-visibilidad-1-pt-1/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2026/01/btl1pt1.png</image:loc><image:title>BTL1PT1</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2026/01/flujo-1.png</image:loc><image:title>flujo</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2026/01/flujo.png</image:loc><image:title>flujo</image:title></image:image><lastmod>2026-01-03T03:27:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/12/28/blueteam-linux-intro-0/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/12/btlinux0.png</image:loc><image:title>BTLinux0</image:title></image:image><lastmod>2026-01-03T01:10:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/mis-proyectos/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/12/generardorpasswords.png</image:loc><image:title>generardorPasswords</image:title></image:image><lastmod>2025-12-12T11:27:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://rojosecurity.com/labs/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/11/portadalablynis.png</image:loc><image:title>portadaLabLynis</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/portadalab1.png</image:loc><image:title>portadaLab1</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/alertasgeneradashost1-1.png</image:loc><image:title>AlertasGeneradasHost1</image:title></image:image><lastmod>2025-11-04T14:32:44+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://rojosecurity.com/2025/11/01/lab-auditoria-de-seguridad-con-lynis/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/11/resultadosesperadossuggestion.png</image:loc><image:title>resultadosEsperadosSuggestion</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/11/nuevaevaluacion.png</image:loc><image:title>nuevaevaluacion</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/11/resultadosesperados.png</image:loc><image:title>resultadosEsperados</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/10/accionescorrectivasssh-1.png</image:loc><image:title>accionescorrectivasSSH</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/10/lynishallazgosssh.png</image:loc><image:title>lynisHallazgosSSH</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/10/lynissuggestion.png</image:loc><image:title>lynisSuggestion</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/10/lyniswarnings.png</image:loc><image:title>lynisWarnings</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/10/lynishardening.png</image:loc><image:title>lynisHardening</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/10/lynisaudit.png</image:loc><image:title>lynisAudit</image:title></image:image><lastmod>2025-11-04T14:24:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/10/28/como-instalar-lynis-en-linux/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/10/lynisrepo.png</image:loc><image:title>lynisrepo</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/10/lynis.png</image:loc><image:title>lynis</image:title></image:image><lastmod>2025-11-01T17:38:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/ciberblog/</loc><lastmod>2025-10-28T17:51:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://rojosecurity.com/2025/09/22/lab-deteccion-de-inicios-de-sesion-fallidos/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/respuestaycontencion2.png.png</image:loc><image:title>respuestaycontencion2.png</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/respuestaycontencion1.png</image:loc><image:title>respuestaycontencion1</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/comandosdeteccionataque.png</image:loc><image:title>comandosDeteccionAtaque</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/alertasgeneradashost1.png</image:loc><image:title>AlertasGeneradasHost1</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/diagramaataquesimulado.png</image:loc><image:title>diagramaAtaqueSimulado</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/diagramainfra.png</image:loc><image:title>diagramaInfra</image:title></image:image><lastmod>2025-10-27T19:45:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/09/30/desplegando-agente-de-wazuh-en-linux/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhagentdeploy11.png</image:loc><image:title>wazuhAgentDeploy11</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhagentdeploy10.png</image:loc><image:title>wazuhAgentDeploy10</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhagentdeploy9.png</image:loc><image:title>wazuhAgentDeploy9</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhagentdeploy8.png</image:loc><image:title>wazuhAgentDeploy8</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhagentdeploy7.png</image:loc><image:title>wazuhAgentDeploy7</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhagentdeploy6.png</image:loc><image:title>wazuhAgentDeploy6</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhagentdeploy5.png</image:loc><image:title>wazuhAgentDeploy5</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhagentdeploy4.png</image:loc><image:title>wazuhAgentDeploy4</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhagentdeploy3-1.png</image:loc><image:title>wazuhAgentDeploy3</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhagentdeploy3.png</image:loc><image:title>wazuhAgentDeploy3</image:title></image:image><lastmod>2025-10-21T17:15:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/09/26/implementacion-rapida-de-wazuh/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhdashboard2-1.png</image:loc><image:title>wazuhDashboard2</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhdashboard2.png</image:loc><image:title>wazuhDashboard2</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhdashboard.png</image:loc><image:title>wazuhDashboard</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wauhlogin2.png</image:loc><image:title>wauhLogin2</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhlogin3.png</image:loc><image:title>wazuhLogin3</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhlogin.png</image:loc><image:title>wazuhLogin</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/installfinish2.png</image:loc><image:title>installFinish2</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/installwazuh1-1.png</image:loc><image:title>installwazuh1</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/09/wazuhrequirements.png</image:loc><image:title>wazuhrequirements</image:title></image:image><lastmod>2025-10-01T04:17:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/08/27/writeup-jangow01-vulnhub/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/portadawujangow01.png</image:loc><image:title>portadaWUjangow01</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/rootjangow01.png</image:loc><image:title>rootjangow01</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/exploitjangow1.png.png</image:loc><image:title>exploitjangow1.png</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/enumhttp3jangow-3.png</image:loc><image:title>enumhttp3jangow</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/enumhttp3jangow-2.png</image:loc><image:title>enumhttp3jangow</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/enumhttp3jangow-1.png</image:loc><image:title>enumhttp3jangow</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/privesc3jangow.png</image:loc><image:title>privesc3jangow</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/privesc2jangow.png</image:loc><image:title>privesc2jangow</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/privescjangow.png</image:loc><image:title>privescjangow</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/flausuariojangow01.png</image:loc><image:title>flausuariojangow01</image:title></image:image><lastmod>2025-09-30T21:16:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/08/29/hacking-web-pt-3-http-request-http-response/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/httprequestresponse.png</image:loc><image:title>HTTPrequestresponse</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/cuerpo-de-respuesta.png</image:loc><image:title>cuerpo de respuesta</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/response-headers.png</image:loc><image:title>response headers</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/2.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/1-1.png</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/1.png</image:loc><image:title>1</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/imagen-12.png</image:loc><image:title>imagen</image:title></image:image><lastmod>2025-09-30T21:15:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/08/28/hacking-web-pt-2-preparando-herramientas/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/preparando-herramientas-1.png</image:loc><image:title>preparando herramientas</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/preparando-herramientas.png</image:loc><image:title>preparando herramientas</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/imagen-11.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/imagen-10.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/imagen-9.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/imagen-8.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/imagen-7.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/imagen-6.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/imagen-5.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/imagen-4.png</image:loc><image:title>imagen</image:title></image:image><lastmod>2025-09-30T21:15:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/08/26/hacking-web-pt-1-introduccion/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/introduccionhackingweb.png</image:loc><image:title>introduccionhackingweb</image:title></image:image><lastmod>2025-09-30T21:14:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/08/28/guia-de-arp-scan-para-pentesters/</loc><lastmod>2025-08-27T01:01:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/08/26/guia-de-netcat-para-pentesters/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/guianetca.png</image:loc><image:title>guianetca</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/guiaarpscan.png</image:loc><image:title>guiaarpscan</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/imagen-1.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/imagen.png</image:loc><image:title>imagen</image:title></image:image><lastmod>2025-08-27T01:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2024/10/21/soc-security-operations-center/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/soc-roles.jpeg</image:loc><image:title>SOC roles</image:title></image:image><lastmod>2025-08-08T20:11:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/writeups/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/road.png</image:loc><image:title>road</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/hackingwebbgtemplate.jpeg</image:loc><image:title>HackingWebBGTemplate</image:title></image:image><lastmod>2025-05-27T22:45:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://rojosecurity.com/certificaciones/</loc><lastmod>2025-05-27T22:17:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://rojosecurity.com/2025/03/01/mi-opinion-sobre-c3sa-certified-cyber-security-analyst-cwl/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/imagen.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/03/c3sa.jpg</image:loc><image:title>C3SA</image:title></image:image><lastmod>2025-05-27T22:12:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/05/01/mi-opinion-sobre-cnsp-certified-network-security-practitioner-thesecopsgroup/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/05/cnsp.webp</image:loc><image:title>cnsp</image:title></image:image><lastmod>2025-05-27T18:34:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/04/19/network-analysis-web-shell/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/btlwunetworkshell13.png</image:loc><image:title>BTLwuNetworkShell13</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/btlwunetworkshell12.png</image:loc><image:title>BTLwuNetworkShell12</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/btlwunetworkshell11.png</image:loc><image:title>BTLwuNetworkShell11</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/btlwunetworkshell10.png</image:loc><image:title>BTLwuNetworkShell10</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/btlwunetworkshell9.png</image:loc><image:title>BTLwuNetworkShell9</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/btlwunetworkshell8.png</image:loc><image:title>BTLwuNetworkShell8</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/btlwunetworkshell7.png</image:loc><image:title>BTLwuNetworkShell7</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/btlwunetworkshell6.png</image:loc><image:title>BTLwuNetworkShell6</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/btlwunetworkshell5.png</image:loc><image:title>BTLwuNetworkShell5}</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2025/04/btlwunetworkshell4.png</image:loc><image:title>BTLwuNetworkShell4</image:title></image:image><lastmod>2025-04-19T18:01:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2024/10/17/introduccion-a-la-ciberseguridad/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/rtbt.jpeg</image:loc><image:title>RTBT</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/ciberseguridadenlanube.jpeg</image:loc><image:title>ciberseguridadenlanube</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/wcshsu1oska96r3hoofy1w.webp</image:loc><image:title>WcShSU1oSKa96r3HoOfy1w</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/09/sql-injection.png</image:loc><image:title>sql-injection</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/09/ransomware.png</image:loc><image:title>ransomware</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/09/dos-attack.png</image:loc><image:title>dos-attack</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/09/social-engineering.png</image:loc><image:title>social-engineering</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/09/phishing-attack.png</image:loc><image:title>phishing-attack</image:title></image:image><lastmod>2025-03-18T18:54:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2024/10/19/cyber-kill-chain/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/7.jpeg</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/cc.jpeg</image:loc><image:title>C&amp;C</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/instalacion.jpeg</image:loc><image:title>instalacion</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/explotacion.jpeg</image:loc><image:title>explotacion</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/delivery.jpeg</image:loc><image:title>Delivery</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/reconocimiento.jpeg</image:loc><image:title>Reconocimiento</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/10/weaponization.jpeg</image:loc><image:title>weaponization</image:title></image:image><lastmod>2025-03-18T17:48:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/01/07/analisis-email-phishing-pt-3/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/12/imagen-4.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/12/imagen-3.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/12/imagen-2.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/12/imagen-1.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/12/imagen.png</image:loc><image:title>imagen</image:title></image:image><lastmod>2025-03-09T19:29:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2024/11/23/analisis-email-phishing-pt-2/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/11/imagen-8.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/11/imagen-7.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/11/imagen-6.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/11/imagen-5.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/11/imagen-4.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/11/imagen-3.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/11/imagen-2.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/11/imagen-1.png</image:loc><image:title>imagen</image:title></image:image><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/11/imagen.png</image:loc><image:title>imagen</image:title></image:image><lastmod>2025-03-09T19:27:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2024/11/10/analisis-email-phishing-pt-1/</loc><image:image><image:loc>https://rojosecurity.com/wp-content/uploads/2024/11/phishing-analysis.jpeg</image:loc><image:title>phishing analysis</image:title></image:image><lastmod>2025-03-09T19:26:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2024/10/24/mitre-attck-framework/</loc><lastmod>2025-03-09T19:21:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com/2025/01/11/guia-de-buenas-practicas-para-ssh/</loc><lastmod>2025-03-09T17:39:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://rojosecurity.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-01-22T19:54:25+00:00</lastmod></url></urlset>
