<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"
	xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
	>
<url><loc>https://spyboy.blog/2026/04/21/from-recon-to-exploitation-the-full-attack-lifecycle-explained-simply/</loc><news:news><news:publication><news:name>Spyboy blog</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-20T23:00:28+00:00</news:publication_date><news:title>From Recon to Exploitation: The Full Attack Lifecycle (Explained Simply)</news:title><news:keywords>Hacking, security</news:keywords></news:news><image:image><image:loc>https://spyboy.blog/wp-content/uploads/2026/04/spyboy-blog-69dc246c4c28f.png?w=150</image:loc></image:image></url><url><loc>https://spyboy.blog/2026/04/20/what-to-do-if-you-get-hacked-a-practical-step-by-step-response-guide/</loc><news:news><news:publication><news:name>Spyboy blog</news:name><news:language>en</news:language></news:publication><news:publication_date>2026-04-19T22:56:25+00:00</news:publication_date><news:title>What to Do If You Get Hacked (A Practical, Step-by-Step Response Guide)</news:title><news:keywords>Reconnaissance, cybersecurity</news:keywords></news:news><image:image><image:loc>https://spyboy.blog/wp-content/uploads/2026/04/spyboy-blog-69dc23c75a30c.png?w=150</image:loc></image:image></url></urlset>