<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://www.doomdefense.com/Doom+Defense</loc></url><url><loc>https://www.doomdefense.com/Resources/Notes/apple/Taming+the+Apple+-+Automating+Network+Requirements+with+Heuristics</loc></url><url><loc>https://www.doomdefense.com/Resources/Notes/space/satellites</loc></url><url><loc>https://www.doomdefense.com/Resources/Notes/space/satellite+hacking</loc></url><url><loc>https://www.doomdefense.com/Resources/Notes/programming/python/python+regex</loc></url><url><loc>https://www.doomdefense.com/Resources/Notes/programming/python/best+practices</loc></url><url><loc>https://www.doomdefense.com/Resources/Notes/programming/c/nasa+jpl+-+rule+of+10</loc></url><url><loc>https://www.doomdefense.com/Resources/Notes/networking/juniper</loc></url><url><loc>https://www.doomdefense.com/Resources/Notes/networking/ex4400+junos+os+configuration</loc></url><url><loc>https://www.doomdefense.com/Resources/Notes/cli/nmap</loc></url><url><loc>https://www.doomdefense.com/Resources/Notes/ai/gemini+-+generated+audio+file</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/vim/iggredible+-+Learn-Vim+-+Learning+Vim+and+Vimscript+doesn't+have+to+be+hard.+This+is+the+guide+that+you're+looking+for</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/vim/The+Essential+IdeaVim+Remaps</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/vim/Supercharge+your+Vim+Skills</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/vim/Learn+Vim+For+the+Last+Time</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/vim/50+Useful+Vim+Commands+-+VimTricks</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/How+to+Scan+Vulnerabilities+With+Nmap+-+A+Comprehensive+Guide</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/sqall01+-+LSMS+-+Linux+Security+and+Monitoring+Scripts</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/sickcodes+-+Docker-OSX+-+Run+macOS+VM+in+a+Docker!+Run+near+native+OSX-KVM+in+Docker!+X11+Forwarding!+CI-CD+for+OS+X+Security+Research!+Docker+mac+Containers.</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/icyguider+-+ICMP-TransferTools+-+Transfer+files+to+and+from+a+Windows+host+via+ICMP+in+restricted+network+environments.</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/rothgar+-+awesome-tmux+-+A+list+of+awesome+resources+for+tmux</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/serhii-londar+-+open-source-mac-os-apps+-++%F0%9F%9A%80+Awesome+list+of+open+source+applications+for+macOS.</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/The+Objective-See+Foundation</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/Neverinstall+-+Virtual+Desktops%2C+Simplified</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/Researchers+unveil+LLM+tool+to+find+Python+zero-days</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/Lookyloo</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/KurtBestor+-+Hitomi-Downloader+-++Desktop+utility+to+download+images-videos-music-text+from+various+websites%2C+and+more.</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/Discover+the+hottest+new+trends</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/AutoRegex+-+Convert+from+English+to+RegEx+with+Natural+Language+Processing</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/Kasm+Workspaces+-+The+Container+Streaming+Platform</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/IT+Tools+-+Handy+online+tools+for+developers</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/HaveIBeenPwned+-+PwnedPasswordsDownloader+-+A+tool+to+download+all+Pwned+Passwords+hash+ranges+and+save+them+offline+so+they+can+be+used+without+a+dependency+on+the+k-anonymity+API</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/ComplianceAsCode+-+content+-+Security+automation+content+in+SCAP%2C+Bash%2C+Ansible%2C+and+other+formats</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/tools/Code+Search+-+Grep+by+Vercel</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/python+programming/Why+you+should+be+using+pathlib</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/python+programming/UV+-+The+Engineering+Secrets+Behind+Python%E2%80%99s+Speed+King</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/python+programming/Share+Python+Scripts+Like+a+Pro+-+uv+and+PEP+723+for+Easy+Deployment</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/python+programming/Python's+many+command-line+utilities</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/python+programming/Adding+keyboard+shortcuts+to+the+Python+REPL</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/python+programming/Combinatoric+iterators+from+itertools</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/python+programming/Modern+Good+Practices+for+Python+Development</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/python+programming/Building+a+Code+Image+Generator+With+Python</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/python+programming/A+year+of+uv+-+pros%2C+cons%2C+and+should+you+migrate</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/python+programming/14+Advanced+Python+Features</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/palo+alto/PAN-OS+8.0+CLI+Commands</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/palo+alto/Setting+up+a+Palo+Alto+Networks+Firewall+for+the+First+Time</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/palo+alto/How+to+View+and+Install+PAN-OS+Software+through+the+CLI+-+Knowledge+Base+-+Palo+Alto+Networks</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/fun/Fake+Windows+Update+Screens</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/osint/OSINT+Investigation+Techniques+for+Missing+Person+Cases+(Trace+Labs)</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/osint/www.thispersondoesnotexist.com</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/osint/My+process+for+setting+up+anonymous+sockpuppet+accounts.</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/osint/Creating+an+Effective+Sock+Puppet+for+OSINT+Investigations+%E2%80%93+Introduction</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/networking/How+to+properly+interpret+a+traceroute+or+MTR</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/Mind+Your+Image+Metadata</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/bregman-arie+-+devops-exercises+-+Linux%2C+Jenkins%2C+AWS%2C+SRE%2C+Prometheus%2C+Docker%2C+Python%2C+Ansible%2C+Git%2C+Kubernetes%2C+Terraform%2C+OpenStack%2C+SQL%2C+NoSQL%2C+Azure%2C+GCP%2C+DNS%2C+Elastic%2C+Network%2C+Virtualization.+DevOps+Interview+Questions</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/What+Are+Firewall+Rules%3F+Ultimate+Guide+(%2B+Best+Practices)</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/Public+Incident+Response+Resources+-+Public+Playbooks+%C2%B7+GitLab</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/Strategies+for+Better+Note+Taking+-+TCM+Security</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/Platform+Engineering+-+Build+vs+Buy</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/EbookFoundation+-+free-programming-books+-+books+-+Freely+available+programming+books</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/Perks+of+Being+a+Python+Core+Developer</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/Lifting+the+world+out+of+the+cybersecurity+poverty</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/I+bought+us-east-1.com+-+A+Look+at+Security%2C+DNS+Traffic%2C+and+Protecting+AWS+Users</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/How+I+prepare+a+technical+talk</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/GeoGuessr-+The+Top+Tips%2C+Tricks+and+Techniques</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/DevSecOps+Fundmentals+Guidebook</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/Cybersecurity+Incident+%26+Vulnerability+Response+Playbooks</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/Building+a+Corporate+Security+Program+From+The+Ground+Up</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/Communicate+Through+Code+-+Blog+by+Roman+Glushko</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/learning/Becoming+an+Advanced+Learner</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/keyboards/Comprehensive+list+of+every+single+keyboard+switch+on+the+Planet</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/git/Commit+Like+A+Pro</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/cybersecurity/sottlmarek+-+DevSecOps+-+Ultimate+DevSecOps+library</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/cybersecurity/How+I+Hacked+NASA</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/cybersecurity/How+to+report+a+security+issue+in+an+open+source+project+-+Jacob+Kaplan-Moss</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/cybersecurity/Parse+a+user+agent</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/cybersecurity/Attacking+Against+DevOps+Environment</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/c+programming/oz123+-+awesome-c+-+A+curated+list+of+awesome+C+frameworks%2C+libraries%2C+resources+and+other+shiny+things.+Inspired+by+all+the+other+awesome-...+projects+out+there.</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/c+programming/libc+manual</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/c+programming/Tutorial+-+Write+a+Shell+in+C+-+Stephen+Brennan</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/blogs/Powershell+for+Hackers+-+Very+cool!</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/blogs/Olivia+A.+Gallucci's+Blog</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/blogs/Blog+%26+Notes+-+Graham+Helton</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/blogs/Xe+Iaso's+-+Blog+Articles</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/apple/Nothing+but+Apple+Notes+-+Exploring+Hidden+Features</loc></url><url><loc>https://www.doomdefense.com/Resources/Bookmarks/apple/How+I+replicated+ThePrimeagen%E2%80%99s+developer+workflow+in+macOS</loc></url><url><loc>https://www.doomdefense.com/Contact</loc></url></urlset>