<?xml version="1.0" encoding="UTF-8"?>
            <urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
               <url><loc>https://cylab.be/</loc></url>
               <url><loc>https://cylab.be/about</loc></url>
               <url><loc>https://cylab.be/contact</loc></url>
               <url><loc>https://cylab.be/research</loc></url>
               <url><loc>https://cylab.be/publications</loc></url>
               <url><loc>https://cylab.be/blog</loc></url>
               <url><loc>https://cylab.be/teaching</loc></url><url><loc>https://cylab.be/blog/496/customize-your-bash-prompt</loc></url><url><loc>https://cylab.be/blog/494/running-local-llms-on-amd-ryzen-ai-9-a-linux-setup-guide</loc></url><url><loc>https://cylab.be/blog/490/tutorial-building-isolated-network-topologies-in-proxmox</loc></url><url><loc>https://cylab.be/blog/491/open-day-and-cyber-awareness-game</loc></url><url><loc>https://cylab.be/blog/487/configure-a-wireguard-vpn-on-opnsense</loc></url><url><loc>https://cylab.be/blog/486/how-to-turn-your-raspberry-pi-into-a-vpn-exit-node-with-tailscale</loc></url><url><loc>https://cylab.be/blog/484/git-subtrees-subrepos-the-simple-way</loc></url><url><loc>https://cylab.be/blog/485/offensive-ebpf-ssh-ejector</loc></url><url><loc>https://cylab.be/blog/483/sshing-old-devices-config-snippet</loc></url><url><loc>https://cylab.be/blog/482/offensive-ebpf-building-a-keylogger-with-libbpf</loc></url><url><loc>https://cylab.be/blog/472/teaming-up-ollama-gpt-oss-and-zed-to-create-a-fully-local-code-assistant</loc></url><url><loc>https://cylab.be/blog/479/the-null-php-cheatsheet-null-coalescing-and-nullsafe-operators</loc></url><url><loc>https://cylab.be/blog/478/ebpf-co-re-portable-tools-setup-testing</loc></url><url><loc>https://cylab.be/blog/475/optimizing-a-management-debian-image-for-faster-kypo-man-node-deployments-on-openstack</loc></url><url><loc>https://cylab.be/blog/477/how-to-reset-a-forgotten-root-password-on-linux-distros</loc></url><url><loc>https://cylab.be/blog/476/offensive-ebpf-from-input-events-to-a-basic-bpftrace-keylogger</loc></url><url><loc>https://cylab.be/blog/474/implement-an-autodiscover-plugin-system-in-php</loc></url><url><loc>https://cylab.be/blog/468/move-home-directory-or-any-other-to-a-dedicated-partition</loc></url><url><loc>https://cylab.be/blog/471/offensive-ebpf-simulating-a-full-disk</loc></url><url><loc>https://cylab.be/blog/469/developing-windows-applications-on-linux-with-neovim-and-mingw-w64</loc></url><url><loc>https://cylab.be/blog/467/configure-client-server-openvpn-on-opnsense</loc></url><url><loc>https://cylab.be/blog/465/pip-pipx-pipenv-what-the-pip</loc></url><url><loc>https://cylab.be/blog/464/connect-thunderbird-to-your-nextcloud-calendar</loc></url><url><loc>https://cylab.be/blog/463/use-thunderbird-to-fetch-your-outlook-365-emails</loc></url><url><loc>https://cylab.be/blog/462/a-visit-to-the-technology-advancement-center</loc></url><url><loc>https://cylab.be/blog/460/setting-up-a-llm-via-pythons-huggingface</loc></url><url><loc>https://cylab.be/blog/459/disable-button-and-show-spinning-arrow-on-click</loc></url><url><loc>https://cylab.be/blog/456/a-practical-evaluation-of-kypo-cyber-range-capacity-and-resource-constraints</loc></url><url><loc>https://cylab.be/blog/457/vmware-pointer-invisible-after-update-in-guest-kali</loc></url><url><loc>https://cylab.be/blog/453/bulk-inserting-users-with-preset-passwords-to-overleaf-ce</loc></url><url><loc>https://cylab.be/blog/450/university-of-ottawa-cyber-range-a-handson-look-at-a-cuttingedge-teaching-tool</loc></url><url><loc>https://cylab.be/blog/449/cybersecurity-challenge-brings-together-international-students-at-tam-2025</loc></url><url><loc>https://cylab.be/blog/448/exploring-windows-recentdocs-order-with-regedit-and-regripper</loc></url><url><loc>https://cylab.be/blog/447/disaster-recovery-exercise</loc></url><url><loc>https://cylab.be/blog/446/cylab-cybersecurity-challenges</loc></url><url><loc>https://cylab.be/blog/444/research-day</loc></url><url><loc>https://cylab.be/blog/442/osint-case-study-geolocate-russian-army-in-syria</loc></url><url><loc>https://cylab.be/blog/443/penetration-testing-of-a-5g-application</loc></url><url><loc>https://cylab.be/blog/440/towards-comparable-and-reusable-research</loc></url><url><loc>https://cylab.be/blog/439/belgium-luxembourg-research-collaboration-on-face-recognition-and-software-supply-chain</loc></url><url><loc>https://cylab.be/blog/426/design-and-implementation-of-a-naval-cyber-range-for-cybersecurity-awareness-and-research</loc></url><url><loc>https://cylab.be/blog/437/continuous-deploy-with-gitlab-docker-and-portainer</loc></url><url><loc>https://cylab.be/blog/434/simplify-your-docker-management-with-portainer</loc></url><url><loc>https://cylab.be/blog/433/export-vmware-virtual-machine-disk-into-a-e01-disk-image</loc></url><url><loc>https://cylab.be/blog/432/using-openrouter-for-single-api-key-access-to-all-your-llm-models</loc></url><url><loc>https://cylab.be/blog/431/publish-your-gitlab-project-to-github</loc></url><url><loc>https://cylab.be/blog/430/vmware-could-not-connect-ethernet0-to-virtual-network-devvmmon</loc></url><url><loc>https://cylab.be/blog/427/securing-external-traffic-on-a-budget-with-wireguard</loc></url><url><loc>https://cylab.be/blog/424/create-slides-and-reports-with-pandoc-and-docker</loc></url><url><loc>https://cylab.be/blog/423/simplify-cicd-pipelines-with-gitlab-components</loc></url><url><loc>https://cylab.be/blog/422/install-and-use-dell-perccli-on-ubuntu</loc></url><url><loc>https://cylab.be/blog/415/neovim-for-yaml</loc></url><url><loc>https://cylab.be/blog/421/firewall-automation-with-opnsense-api-and-php</loc></url><url><loc>https://cylab.be/blog/420/laravel-model-property-compression</loc></url><url><loc>https://cylab.be/blog/416/how-to-set-up-a-proof-of-concept-wi-fi-mesh-network</loc></url><url><loc>https://cylab.be/blog/419/exploring-automatic1111-stable-diffusion</loc></url><url><loc>https://cylab.be/blog/418/install-tp-link-omada-wifi-controller-on-ubuntu</loc></url><url><loc>https://cylab.be/blog/417/shadow-analysis-2-guessing-time-with-zero-context</loc></url><url><loc>https://cylab.be/blog/414/building-streamlit-apps-with-state</loc></url><url><loc>https://cylab.be/blog/413/kickstarting-ml-apps-with-streamlit-in-30-minutes</loc></url><url><loc>https://cylab.be/blog/412/ceph-distributed-storage-part-2-file-storage-performance</loc></url><url><loc>https://cylab.be/blog/411/shadow-analysis-1-the-osint-trick-behind-telling-time-from-a-picture</loc></url><url><loc>https://cylab.be/blog/408/send-large-files-on-email-using-thunderbird-and-nextcloud</loc></url><url><loc>https://cylab.be/blog/406/getting-started-with-libbpf-tracking-execve-syscalls-with-ebpf-and-co-re</loc></url><url><loc>https://cylab.be/blog/405/elf-header-manipulation</loc></url><url><loc>https://cylab.be/blog/403/dell-servers-generations-cheatsheet</loc></url><url><loc>https://cylab.be/blog/399/ceph-distributed-storage-part-1-installation</loc></url><url><loc>https://cylab.be/blog/402/cyber-security-challenge-belgium-2025-qualifiers</loc></url><url><loc>https://cylab.be/blog/393/out-of-band-server-management-dell-idrac</loc></url><url><loc>https://cylab.be/blog/395/ghosts-v80-implementation-orchestrating-realistic-traffic-for-poc-attack-simulation-and-log-monitoring</loc></url><url><loc>https://cylab.be/blog/398/how-to-fix-ubuntu-freezing-after-login-due-to-graphics-driver-issues</loc></url><url><loc>https://cylab.be/blog/392/install-windows-on-a-usb-drive</loc></url><url><loc>https://cylab.be/blog/391/integrate-a-large-language-model-llm-in-your-php-application</loc></url><url><loc>https://cylab.be/blog/390/data-deduplication</loc></url><url><loc>https://cylab.be/blog/387/2024-in-numbers</loc></url><url><loc>https://cylab.be/blog/388/a-solution-to-version-glibc-2xx-not-found</loc></url><url><loc>https://cylab.be/blog/385/pivoting-cobalt-strikes-beacon-through-meterpreter</loc></url><url><loc>https://cylab.be/blog/383/introducing-dogrant-a-streamlined-vagrant-configuration-cli</loc></url><url><loc>https://cylab.be/blog/382/elaborated-new-phishing-method-targeting-belgian-people-part-1</loc></url><url><loc>https://cylab.be/blog/368/multipass-vs-vagrant-for-creating-docker-ready-vms</loc></url><url><loc>https://cylab.be/blog/379/linux-malware-challenges-threats</loc></url><url><loc>https://cylab.be/blog/99/dump-the-memory-of-a-virtualbox-vm-for-volatility3</loc></url><url><loc>https://cylab.be/blog/378/measuring-network-performance-with-iperf3</loc></url><url><loc>https://cylab.be/blog/377/run-your-own-local-llm-with-ollama</loc></url><url><loc>https://cylab.be/blog/376/cylab-at-the-digilience-conference</loc></url><url><loc>https://cylab.be/blog/375/nato-winter-meeting-visual-analytics-for-complex-systems</loc></url><url><loc>https://cylab.be/blog/258/automatic-docker-reverse-proxy-with-traefik</loc></url><url><loc>https://cylab.be/blog/372/battle-ready</loc></url><url><loc>https://cylab.be/blog/363/cyber-awareness-game</loc></url><url><loc>https://cylab.be/blog/367/harvesting-pgp-secret-keys-from-poorly-secured-thunderbird-instance</loc></url><url><loc>https://cylab.be/blog/292/install-autopsy-on-linux-and-on-the-sift-workstation</loc></url><url><loc>https://cylab.be/blog/366/a-brief-overview-of-passkey</loc></url><url><loc>https://cylab.be/blog/365/create-your-own-plugin-for-regripper</loc></url><url><loc>https://cylab.be/blog/364/recover-lost-files-with-photorec</loc></url><url><loc>https://cylab.be/blog/362/cylab-cybersecurity-challenges</loc></url><url><loc>https://cylab.be/blog/360/getting-started-with-eve-ng</loc></url><url><loc>https://cylab.be/blog/358/run-a-local-instance-of-stable-diffusion-and-use-ai-to-generate-images</loc></url><url><loc>https://cylab.be/blog/357/cylab-at-the-ares-conference-2024</loc></url><url><loc>https://cylab.be/blog/356/ai-powered-knowledge-exploration-with-globe-explorer</loc></url><url><loc>https://cylab.be/blog/355/install-eric-zimmermans-forensics-tools-on-linux</loc></url><url><loc>https://cylab.be/blog/353/geth-developer-mode</loc></url><url><loc>https://cylab.be/blog/354/javascript-linting-with-eslint</loc></url><url><loc>https://cylab.be/blog/352/a-practical-introduction-to-ebpf</loc></url><url><loc>https://cylab.be/blog/351/performance-of-virtual-storage-part-2-qemu</loc></url><url><loc>https://cylab.be/blog/350/webinars-rma-apt-detection-and-blockchain</loc></url><url><loc>https://cylab.be/blog/349/performance-penalty-of-storage-virtualization</loc></url><url><loc>https://cylab.be/blog/348/virtual-machine-manager-the-graphical-interface-for-qemu</loc></url><url><loc>https://cylab.be/blog/347/linux-kernel-threads-and-processes-management-task-struct</loc></url><url><loc>https://cylab.be/blog/344/create-a-linux-kernel-module</loc></url><url><loc>https://cylab.be/blog/346/ipfs-api-a-go-ipfs-rpc-api-client</loc></url><url><loc>https://cylab.be/blog/345/optimising-python-programs-with-py-spy-and-timeit</loc></url><url><loc>https://cylab.be/blog/343/compile-and-install-the-linux-kernel</loc></url><url><loc>https://cylab.be/blog/339/get-started-with-laravel-sail</loc></url><url><loc>https://cylab.be/blog/341/systemd-basic-concepts</loc></url><url><loc>https://cylab.be/blog/340/analyse-of-a-crypto-scam</loc></url><url><loc>https://cylab.be/blog/338/standalone-security-onion-a-perfect-siem-solution-for-small-networks</loc></url><url><loc>https://cylab.be/blog/336/use-docker-compose-to-create-a-dev-environment-for-laravel-6-7-and-8</loc></url><url><loc>https://cylab.be/blog/337/sending-sms-with-a-usb-gsm-modem-and-python</loc></url><url><loc>https://cylab.be/blog/334/solidity-abi-encoding-explained</loc></url><url><loc>https://cylab.be/blog/333/pseudonymisation-by-random-tables</loc></url><url><loc>https://cylab.be/blog/332/add-modules-to-your-micro-linux</loc></url><url><loc>https://cylab.be/blog/331/gitlab-fix-cgroups-cgroup-mountpoint-does-not-exist-unknown</loc></url><url><loc>https://cylab.be/blog/330/benchmark-linux-systems-with-sysbench</loc></url><url><loc>https://cylab.be/blog/329/use-phpunit-to-test-your-php-project</loc></url><url><loc>https://cylab.be/blog/326/are-sms-messages-vulnerable-in-5g</loc></url><url><loc>https://cylab.be/blog/328/cyber-awareness-game</loc></url><url><loc>https://cylab.be/blog/327/cyber-security-challenge-belgium-2024</loc></url><url><loc>https://cylab.be/blog/320/build-a-kernel-initramfs-and-busybox-to-create-your-own-micro-linux</loc></url><url><loc>https://cylab.be/blog/322/gweb3-a-go-module-to-interact-with-ethereum-blockchain</loc></url><url><loc>https://cylab.be/blog/321/network-boot-for-uefi-devices-with-ipxe</loc></url><url><loc>https://cylab.be/blog/319/understand-and-implement-pxe-network-boot</loc></url><url><loc>https://cylab.be/blog/318/create-a-handler-for-opening-special-urls-like-ssh</loc></url><url><loc>https://cylab.be/blog/317/the-p4-language-overview-of-p4-programming</loc></url><url><loc>https://cylab.be/blog/316/the-mark-python-client</loc></url><url><loc>https://cylab.be/blog/314/the-p4-language-the-basics-of-p4-language</loc></url><url><loc>https://cylab.be/blog/312/velociraptor-hunt-malwares-as-a-pack</loc></url><url><loc>https://cylab.be/blog/311/explore-the-sam-hive-with-regedit-and-sysinternals</loc></url><url><loc>https://cylab.be/blog/310/install-sysinternals</loc></url><url><loc>https://cylab.be/blog/309/using-tryhackme-cyberrange-for-csc-workshops</loc></url><url><loc>https://cylab.be/blog/307/how-to-make-your-machine-trust-your-self-signed-certificates</loc></url><url><loc>https://cylab.be/blog/304/guessing-the-width-of-an-image</loc></url><url><loc>https://cylab.be/blog/303/eda-milcert-2023</loc></url><url><loc>https://cylab.be/blog/294/testing-an-image-format</loc></url><url><loc>https://cylab.be/blog/297/what-is-situation-awareness</loc></url><url><loc>https://cylab.be/blog/296/happy-birthday-to-us</loc></url><url><loc>https://cylab.be/blog/295/how-to-analyse-https-traffic-with-mitmproxy-transparent-mode</loc></url><url><loc>https://cylab.be/blog/291/complicated-and-complex-systems-brief-introduction</loc></url><url><loc>https://cylab.be/blog/290/install-eric-zimmermans-forensics-toolkit</loc></url><url><loc>https://cylab.be/blog/288/how-to-use-mattermost-golang-driver</loc></url><url><loc>https://cylab.be/blog/289/we-welcome-the-hungarian-cybersecurity-roadshow-delegation</loc></url><url><loc>https://cylab.be/blog/287/sift-workstation-fix-rippl-error-global-symbol-plugindir-requires-explicit-package-name</loc></url><url><loc>https://cylab.be/blog/229/continuous-deployment-with-gitlab-and-docker-compose</loc></url><url><loc>https://cylab.be/blog/286/building-your-bash-toolkit-simplifying-key-value-extractions-with-extract-value</loc></url><url><loc>https://cylab.be/blog/281/ethereum-under-the-hood</loc></url><url><loc>https://cylab.be/blog/285/building-your-bash-toolkit-creating-a-dynamic-argument-processor-in-bash</loc></url><url><loc>https://cylab.be/blog/284/building-your-bash-toolkit-getting-started</loc></url><url><loc>https://cylab.be/blog/283/recovering-deleted-files-with-foremost</loc></url><url><loc>https://cylab.be/blog/280/deploy-smart-contract-to-a-local-blockchain</loc></url><url><loc>https://cylab.be/blog/279/install-a-recent-kernel-on-ubuntu</loc></url><url><loc>https://cylab.be/blog/278/cyber-summer-school</loc></url><url><loc>https://cylab.be/blog/277/changing-dockers-default-subnet-ip-range</loc></url><url><loc>https://cylab.be/blog/272/collaboration-agreement-between-the-cyber-command-and-the-royal-military-academy</loc></url><url><loc>https://cylab.be/blog/271/unit-testing-c-code</loc></url><url><loc>https://cylab.be/blog/270/rma-and-naval-group-team-up-for-naval-cyber-security</loc></url><url><loc>https://cylab.be/blog/269/how-to-detect-filtered-and-opened-outgoing-ports-on-a-network</loc></url><url><loc>https://cylab.be/blog/268/cyber-summer-school</loc></url><url><loc>https://cylab.be/blog/267/whisper-speech-to-text-ai</loc></url><url><loc>https://cylab.be/blog/266/install-and-use-python-on-windows-with-anaconda</loc></url><url><loc>https://cylab.be/blog/262/adv-bot-realistic-adversarial-botnet-attacks-against-network-intrusion-detection-systems</loc></url><url><loc>https://cylab.be/blog/261/cyber-security-challenge-congrats</loc></url><url><loc>https://cylab.be/blog/260/sqlmap-additional-techniques</loc></url><url><loc>https://cylab.be/blog/259/cyber-security-challenge-qualifiers</loc></url><url><loc>https://cylab.be/blog/256/fully-customizable-emails-using-laravel-9</loc></url><url><loc>https://cylab.be/blog/255/web-shells-and-the-dangers-of-unrestricted-file-upload</loc></url><url><loc>https://cylab.be/blog/254/crack-a-login-page-the-easy-way</loc></url><url><loc>https://cylab.be/blog/253/virustotal-what-is-it-and-what-is-it-good-for</loc></url><url><loc>https://cylab.be/blog/252/sql-injection-with-sqlmap</loc></url><url><loc>https://cylab.be/blog/251/2022-in-numbers</loc></url><url><loc>https://cylab.be/blog/250/filter-usb-devices-with-udev-and-some-php-code</loc></url><url><loc>https://cylab.be/blog/245/network-traffic-analysis-with-python-scapy-and-some-machine-learning</loc></url><url><loc>https://cylab.be/blog/249/install-and-use-different-versions-of-php</loc></url><url><loc>https://cylab.be/blog/248/share-on-mastodon-with-shareonjs</loc></url><url><loc>https://cylab.be/blog/246/install-kubernetes-on-ubuntu-2204-with-microk8s</loc></url><url><loc>https://cylab.be/blog/242/hardening-apache</loc></url><url><loc>https://cylab.be/blog/247/how-good-is-chatgpt-the-new-conversational-model-of-openai</loc></url><url><loc>https://cylab.be/blog/243/we-are-coaching-students-for-the-cyber-security-challenge</loc></url><url><loc>https://cylab.be/blog/241/use-loki-to-monitor-the-logs-of-your-docker-compose-application</loc></url><url><loc>https://cylab.be/blog/240/2-factor-authentication-for-laravel-using-totp</loc></url><url><loc>https://cylab.be/blog/226/mitre-attck-in-practice-part-ii-caldera</loc></url><url><loc>https://cylab.be/blog/239/use-a-raspberry-pi-for-dynamic-routing</loc></url><url><loc>https://cylab.be/blog/238/mounting-a-host-folder-in-wsl-or-virtualbox-kali-machine</loc></url><url><loc>https://cylab.be/blog/237/conference-on-digital-transformation-cybersecurity-and-resilience-digilience-2022</loc></url><url><loc>https://cylab.be/blog/236/python-or-c-or-pythonc</loc></url><url><loc>https://cylab.be/blog/235/calling-c-from-python</loc></url><url><loc>https://cylab.be/blog/234/creating-a-dynamic-library-in-c</loc></url><url><loc>https://cylab.be/blog/233/how-and-why-to-use-tex-live</loc></url><url><loc>https://cylab.be/blog/230/ssh-agent-and-ssh-add</loc></url><url><loc>https://cylab.be/blog/224/mitre-attck-in-practice-part-i-navigator-atomic-red-team</loc></url><url><loc>https://cylab.be/blog/227/build-and-store-docker-images-with-gitlab</loc></url><url><loc>https://cylab.be/blog/225/getting-started-with-ansible</loc></url><url><loc>https://cylab.be/blog/223/file-upload-validation-and-storage-with-laravel</loc></url><url><loc>https://cylab.be/blog/222/syntax-highlighting-with-prismjs-for-your-laravel-application</loc></url><url><loc>https://cylab.be/blog/221/a-light-nat-router-and-dhcp-server-with-alpine-linux</loc></url><url><loc>https://cylab.be/blog/220/network-reconnaissance-with-arp-scan</loc></url><url><loc>https://cylab.be/blog/219/notifications-with-toastr-and-laravel</loc></url><url><loc>https://cylab.be/blog/218/create-deploy-a-discord-bot-part-33-bot-deployment</loc></url><url><loc>https://cylab.be/blog/217/create-deploy-a-discord-bot-part-23-bot-features</loc></url><url><loc>https://cylab.be/blog/216/create-deploy-a-discord-bot-part-13-bot-creation</loc></url><url><loc>https://cylab.be/blog/204/support-vector-machine-how-and-what</loc></url><url><loc>https://cylab.be/blog/213/orchestration-script-to-simulate-user-activity-on-multiple-machines-thanks-to-the-ghosts-framework</loc></url><url><loc>https://cylab.be/blog/215/cyrange-scenarios</loc></url><url><loc>https://cylab.be/blog/212/mitre-attck-and-the-attck-matrix</loc></url><url><loc>https://cylab.be/blog/211/dns-over-https-and-dns-over-tls-with-dnsdist</loc></url><url><loc>https://cylab.be/blog/210/laravel-actionaccess-control-with-policies</loc></url><url><loc>https://cylab.be/blog/209/network-monitoring-log-dns-queries-with-bind</loc></url><url><loc>https://cylab.be/blog/208/what-is-vowifi-wi-fi-calling</loc></url><url><loc>https://cylab.be/blog/207/cyber-security-evening</loc></url><url><loc>https://cylab.be/blog/206/cyberchef-the-cyber-swiss-army-knife</loc></url><url><loc>https://cylab.be/blog/205/kali-linux-and-parrot-sec-os-penetration-environment-comparison</loc></url><url><loc>https://cylab.be/blog/203/secure-cookies-with-laravel</loc></url><url><loc>https://cylab.be/blog/202/mobile-phones-should-you-be-afraid-of-disclosing-your-imsi</loc></url><url><loc>https://cylab.be/blog/200/create-and-automatically-correct-multiple-choice-tests-with-amc</loc></url><url><loc>https://cylab.be/blog/199/cyrange-firewall-configuration</loc></url><url><loc>https://cylab.be/blog/191/cloning-a-disk-with-clonezilla</loc></url><url><loc>https://cylab.be/blog/198/configure-apache-reverse-proxy-in-front-of-cyrange</loc></url><url><loc>https://cylab.be/blog/159/laravel-optimization-self-hosted-fonts</loc></url><url><loc>https://cylab.be/blog/197/deploy-loki-on-kubernetes-and-monitor-the-logs-of-your-pods</loc></url><url><loc>https://cylab.be/blog/196/cyber-security-challenge-2022</loc></url><url><loc>https://cylab.be/blog/195/getting-started-with-helm</loc></url><url><loc>https://cylab.be/blog/176/a-bit-of-pil-for-bit-plane-display</loc></url><url><loc>https://cylab.be/blog/194/apache-log-real-ip-addresses-behind-a-reverse-proxy</loc></url><url><loc>https://cylab.be/blog/193/laravel-optimization-reduce-css-size</loc></url><url><loc>https://cylab.be/blog/192/2021-in-numbers</loc></url><url><loc>https://cylab.be/blog/190/run-a-development-environment-for-laravel-with-docker-compose</loc></url><url><loc>https://cylab.be/blog/188/defer-async-and-inline-javascript</loc></url><url><loc>https://cylab.be/blog/187/save-the-planet-disable-facebook-email-notifications</loc></url><url><loc>https://cylab.be/blog/186/new-ways-to-run-kali-linux-on-windows-using-wsl</loc></url><url><loc>https://cylab.be/blog/185/mark-visualizations-with-d3js</loc></url><url><loc>https://cylab.be/blog/181/secure-your-project-with-the-gitlab-sast-analyzers</loc></url><url><loc>https://cylab.be/blog/184/laravel-database-transactions-mysqldump</loc></url><url><loc>https://cylab.be/blog/183/configure-rolling-backups-with-rsnapshot</loc></url><url><loc>https://cylab.be/blog/180/running-and-imaging-with-ftk-imager-from-a-flash-device</loc></url><url><loc>https://cylab.be/blog/174/log-management-with-loki-getting-started</loc></url><url><loc>https://cylab.be/blog/172/what-is-a-genetic-algorithm-and-how-does-it-work</loc></url><url><loc>https://cylab.be/blog/173/email-tracking-techniques</loc></url><url><loc>https://cylab.be/blog/171/sms-based-2-factor-authentication-is-insecure</loc></url><url><loc>https://cylab.be/blog/170/icons2021-best-paper-award</loc></url><url><loc>https://cylab.be/blog/169/detect-unnecessary-use-statements-with-php-codesniffer</loc></url><url><loc>https://cylab.be/blog/166/mark-add-images-to-your-detection-reports</loc></url><url><loc>https://cylab.be/blog/165/fixing-circuit-breaking-exception-parent-data-too-large-data-for-http-request-elk-stack-error</loc></url><url><loc>https://cylab.be/blog/164/gitlab-enable-2-factor-authentication-2fa</loc></url><url><loc>https://cylab.be/blog/163/packet-tracer-getting-started</loc></url><url><loc>https://cylab.be/blog/161/record-and-share-your-terminal-sessions-with-asciinema</loc></url><url><loc>https://cylab.be/blog/160/testing-with-selenium-and-phpunit</loc></url><url><loc>https://cylab.be/blog/115/mark-use-built-in-file-data-source</loc></url><url><loc>https://cylab.be/blog/156/force-https-with-http-strict-transport-security-hsts</loc></url><url><loc>https://cylab.be/blog/157/laravel-optimization-static-content-caching-and-cache-busting</loc></url><url><loc>https://cylab.be/blog/155/harden-your-laravel-app-with-csp-headers</loc></url><url><loc>https://cylab.be/blog/154/exposing-a-kubernetes-application-service-hostport-nodeport-loadbalancer-or-ingresscontroller</loc></url><url><loc>https://cylab.be/blog/150/http-benchmarking-with-wrk2</loc></url><url><loc>https://cylab.be/blog/151/avoid-docker-hub-pull-limit-with-gitlab</loc></url><url><loc>https://cylab.be/blog/149/what-is-obsidianmd-and-why-you-should-use-it</loc></url><url><loc>https://cylab.be/blog/148/install-and-use-dell-openmanage-server-administrator-omsa-on-ubuntu</loc></url><url><loc>https://cylab.be/blog/147/bpost-android-malware</loc></url><url><loc>https://cylab.be/blog/146/run-your-laravel-application-on-kubernetes</loc></url><url><loc>https://cylab.be/blog/144/laravel-custom-logging</loc></url><url><loc>https://cylab.be/blog/145/multi-tenant-kubernetes-cluster-namespace-quota-and-kubectl-user</loc></url><url><loc>https://cylab.be/blog/143/add-users-to-a-group-in-nextcloud</loc></url><url><loc>https://cylab.be/blog/142/collecting-data-with-filebeat</loc></url><url><loc>https://cylab.be/blog/141/create-your-own-vm-image-for-the-cyber-range</loc></url><url><loc>https://cylab.be/blog/140/the-elk-stack-and-how-to-use-it</loc></url><url><loc>https://cylab.be/blog/138/change-the-mac-address-of-your-linux-system</loc></url><url><loc>https://cylab.be/blog/137/implementing-email-verification-in-laravel</loc></url><url><loc>https://cylab.be/blog/136/training-session-git-gitlab-and-ci</loc></url><url><loc>https://cylab.be/blog/135/optimizing-and-compressing-your-windows-virtual-machine</loc></url><url><loc>https://cylab.be/blog/134/automated-web-application-testing-with-php-selenium-and-gitlab</loc></url><url><loc>https://cylab.be/blog/131/run-your-laravel-app-with-docker-compose</loc></url><url><loc>https://cylab.be/blog/133/opportunities-of-covid-19-misinformation</loc></url><url><loc>https://cylab.be/blog/132/installing-the-cyrange-cyber-range-platform</loc></url><url><loc>https://cylab.be/blog/130/laravel-migrations-tips</loc></url><url><loc>https://cylab.be/blog/129/foreing-powers-are-using-covid-to-harm-european-countries-and-industries</loc></url><url><loc>https://cylab.be/blog/128/osint-quiz</loc></url><url><loc>https://cylab.be/blog/127/cyber-security-challenge</loc></url><url><loc>https://cylab.be/blog/126/check-your-php-dependencies-for-vulnerabilities</loc></url><url><loc>https://cylab.be/blog/125/windows-forensics-analysis-tools-autopsy</loc></url><url><loc>https://cylab.be/blog/123/osint-simple-tips-5-email-addresses</loc></url><url><loc>https://cylab.be/blog/122/using-https-over-a-reverse-proxy-in-laravel</loc></url><url><loc>https://cylab.be/blog/120/continuous-deployment-with-gitlab-and-laravel-envoy</loc></url><url><loc>https://cylab.be/blog/121/osint-simple-tips-4-usernames</loc></url><url><loc>https://cylab.be/blog/118/multi-agent-ranking-framework-test-the-online-demo</loc></url><url><loc>https://cylab.be/blog/117/automatic-uml-diagram-generation-for-maven-projects</loc></url><url><loc>https://cylab.be/blog/116/osint-simple-tips-3-google-dorks</loc></url><url><loc>https://cylab.be/blog/107/2020-in-numbers</loc></url><url><loc>https://cylab.be/blog/114/fail-a-phpunit-test-if-coverage-goes-below-a-threshold</loc></url><url><loc>https://cylab.be/blog/113/implement-a-java-detector-for-the-multi-agent-ranking-framework</loc></url><url><loc>https://cylab.be/blog/112/continuous-deployment-with-gitlab-and-kubernetes</loc></url><url><loc>https://cylab.be/blog/110/osint-simple-tips-2-facebook</loc></url><url><loc>https://cylab.be/blog/109/installing-linux-bash-shell-and-metasploit-on-windows-10</loc></url><url><loc>https://cylab.be/blog/108/osint-simple-tips-1-linkedin</loc></url><url><loc>https://cylab.be/blog/106/mark-use-built-in-detectors</loc></url><url><loc>https://cylab.be/blog/105/getting-started-with-mark-create-a-php-data-injector</loc></url><url><loc>https://cylab.be/blog/104/multi-agent-ranking-framework-version-2-is-out</loc></url><url><loc>https://cylab.be/blog/60/email-insecurity</loc></url><url><loc>https://cylab.be/blog/101/password-guessing-with-hydra</loc></url><url><loc>https://cylab.be/blog/98/install-volatility-on-debian-ubuntu-mint</loc></url><url><loc>https://cylab.be/blog/97/compute-code-coverage-for-a-multi-module-maven-project-with-jacoco</loc></url><url><loc>https://cylab.be/blog/95/test-your-laravel-project-with-gitlab</loc></url><url><loc>https://cylab.be/blog/92/measure-ambient-temperature-with-temper-and-linux</loc></url><url><loc>https://cylab.be/blog/94/compute-the-code-coverage-of-your-tests-with-java-and-maven</loc></url><url><loc>https://cylab.be/blog/91/build-a-bare-metal-kubernetes-cluster</loc></url><url><loc>https://cylab.be/blog/90/laravel-vuejs-quickstart</loc></url><url><loc>https://cylab.be/blog/89/welcome-to-our-new-researcher</loc></url><url><loc>https://cylab.be/blog/88/pwndrop-self-hosting-payloads</loc></url><url><loc>https://cylab.be/blog/85/dockerize-your-laravel-app-part-2-gitlab-and-multi-stage-build</loc></url><url><loc>https://cylab.be/blog/86/press-review</loc></url><url><loc>https://cylab.be/blog/84/dockerize-your-laravel-app</loc></url><url><loc>https://cylab.be/blog/83/setting-up-a-watering-hole-attack-with-metasploit</loc></url><url><loc>https://cylab.be/blog/82/static-code-analysis-for-laravel</loc></url><url><loc>https://cylab.be/blog/81/simulate-user-activity-with-the-ghosts-framework-client-set-up-and-timelines</loc></url><url><loc>https://cylab.be/blog/58/owasp-dependency-check-for-java</loc></url><url><loc>https://cylab.be/blog/80/masfad-2-at-eda-captech-cyber</loc></url><url><loc>https://cylab.be/blog/79/publish-gitlab-notifications-to-mattermost</loc></url><url><loc>https://cylab.be/blog/65/security-onion-getting-started</loc></url><url><loc>https://cylab.be/blog/53/detect-unused-composer-dependencies</loc></url><url><loc>https://cylab.be/blog/77/covid-19-tracking-application</loc></url><url><loc>https://cylab.be/blog/75/how-to-aggregate-scores-in-a-multi-heuristic-detection-system-a-comparison-between-wowa-and-neural-networks</loc></url><url><loc>https://cylab.be/blog/74/covid-19-android-malware</loc></url><url><loc>https://cylab.be/blog/71/simulate-user-activity-with-the-ghosts-framework-introduction</loc></url><url><loc>https://cylab.be/blog/61/implement-crud-operations-in-laravel-and-automatic-code-generation</loc></url><url><loc>https://cylab.be/blog/73/man-in-the-middle-mitm-with-arpspoof</loc></url><url><loc>https://cylab.be/blog/70/mobile-device-security-training</loc></url><url><loc>https://cylab.be/blog/69/decompile-and-modify-an-android-application</loc></url><url><loc>https://cylab.be/blog/68/cyber-range-release-0022</loc></url><url><loc>https://cylab.be/blog/62/stealthy-website-scanning-thanks-to-archiveorg</loc></url><url><loc>https://cylab.be/blog/11/laravel-quickstart</loc></url><url><loc>https://cylab.be/blog/57/find-secret-api-token-in-android-application</loc></url><url><loc>https://cylab.be/blog/51/static-code-analysis-in-php-and-gitlab</loc></url><url><loc>https://cylab.be/blog/56/information-gathering-with-blackwidow</loc></url><url><loc>https://cylab.be/blog/50/mark-release-0028</loc></url><url><loc>https://cylab.be/blog/49/manage-virtualbox-with-php</loc></url><url><loc>https://cylab.be/blog/48/understanding-laravel-middleware-admin-users</loc></url><url><loc>https://cylab.be/blog/47/distributed-k-nn-graphs-and-similarity-search</loc></url><url><loc>https://cylab.be/blog/46/modify-your-static-ip-on-ubuntu-server</loc></url><url><loc>https://cylab.be/blog/45/disable-user-registration-in-your-laravel-application</loc></url><url><loc>https://cylab.be/blog/44/easy-testing-with-python-doctest-and-gitlab</loc></url><url><loc>https://cylab.be/blog/43/type-hinting-in-python-and-testing-with-gitlab</loc></url><url><loc>https://cylab.be/blog/42/collecting-and-processing-netflow-on-ubuntu</loc></url><url><loc>https://cylab.be/blog/41/cybersecurity-tournament-2020</loc></url><url><loc>https://cylab.be/blog/39/create-a-local-python-pip-repository</loc></url><url><loc>https://cylab.be/blog/38/create-a-local-apt-mirror-for-offline-usage</loc></url><url><loc>https://cylab.be/blog/37/generate-roc-curve-and-compute-auc-in-java</loc></url><url><loc>https://cylab.be/blog/36/mongodb-sharding-on-a-single-server</loc></url><url><loc>https://cylab.be/blog/35/apache-spark-mapreduce-with-php</loc></url><url><loc>https://cylab.be/blog/32/how-does-wpawpa2-wifi-security-work-and-how-to-crack-it</loc></url><url><loc>https://cylab.be/blog/33/how-to-upload-your-files-to-nextcloud-file-drop-using-curl</loc></url><url><loc>https://cylab.be/blog/31/publishing-your-python-project-to-the-pypi-repository</loc></url><url><loc>https://cylab.be/blog/30/running-gitlab-tests-locally-with-docker-ce</loc></url><url><loc>https://cylab.be/blog/29/using-labrea-tarpit-to-hinder-network-scans</loc></url><url><loc>https://cylab.be/blog/28/bemilcis2019-blockchain-for-dummies</loc></url><url><loc>https://cylab.be/blog/26/a-simple-java-implementation-of-blockchain</loc></url><url><loc>https://cylab.be/blog/25/blockchain</loc></url><url><loc>https://cylab.be/blog/24/icmcis2019</loc></url><url><loc>https://cylab.be/blog/23/automatic-release-with-gitlab-and-simplerepos</loc></url><url><loc>https://cylab.be/blog/22/using-php-codesniffer-in-a-laravel-project</loc></url><url><loc>https://cylab.be/blog/21/using-font-awesome-in-a-laravel-project</loc></url><url><loc>https://cylab.be/blog/20/avoid-leaking-secrets-in-your-gitlab-repository</loc></url><url><loc>https://cylab.be/blog/19/automatic-bug-detection-with-spotbugs-and-maven</loc></url><url><loc>https://cylab.be/blog/18/gitlab-automatically-testing-your-python-project</loc></url><url><loc>https://cylab.be/blog/17/echo-project-kick-off-meeting</loc></url><url><loc>https://cylab.be/blog/16/using-gridfs-to-store-files-in-mongodb-java</loc></url><url><loc>https://cylab.be/blog/15/maven-not-running-all-junit-tests</loc></url><url><loc>https://cylab.be/blog/13/installing-nextcloud-ubuntu-client</loc></url><url><loc>https://cylab.be/blog/12/phising-with-2fa-bypass-using-evilginx</loc></url><url><loc>https://cylab.be/blog/9/an-introduction-to-laravel-orm-eloquent</loc></url><url><loc>https://cylab.be/blog/1/using-laravel-with-a-sqlite-database</loc></url><url><loc>https://cylab.be/blog/8/using-custom-docker-images-with-gitlab</loc></url><url><loc>https://cylab.be/blog/7/gitlab-quickstart</loc></url><url><loc>https://cylab.be/blog/6/a-java-introduction-to-orientdb-document-database</loc></url><url><loc>https://cylab.be/blog/3/students-projects-2017-2018</loc></url><url><loc>https://cylab.be/blog/2/icmcis-2018</loc></url></urlset>