<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://www.deaddisk.com/tags/active-directory/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/aws-security/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/azure-security/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/cloud-security/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/compliance/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/enumeration/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/ethical-hacking/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/exploitation/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/hipaa/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/kubernetes-security/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/lateral-movement/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/methodology/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/mitre-attck/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/network-security/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/nmap/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/osint/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/pci-dss/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/penetration-testing/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/pentesting/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/port-scanning/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/red-team/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/reporting/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/security-assessment/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/complete-guide-professional-penetration-testing/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/nmap/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/vulnerability-assessment/</loc><lastmod>2025-09-06T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/categories/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/deleted-file-recovery/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/dfir/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/categories/dfir/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/categories/digital-forensics/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/forensic-artifacts/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/incident-response/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/recycle-bin/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/recycle_bin/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/windows-forensics/</loc><lastmod>2025-09-01T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/chain-of-custody/</loc><lastmod>2025-08-31T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/dc3dd/</loc><lastmod>2025-08-31T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/dd-command/</loc><lastmod>2025-08-31T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/digital-evidence/</loc><lastmod>2025-08-31T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/ewf-format/</loc><lastmod>2025-08-31T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/forensic-disk-acquisition-linux-guide/</loc><lastmod>2025-08-31T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/forensic-disk-imaging/</loc><lastmod>2025-08-31T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/hash-verification/</loc><lastmod>2025-08-31T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/linux-forensics/</loc><lastmod>2025-08-31T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/write-blocker/</loc><lastmod>2025-08-31T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/vss/</loc><lastmod>2025-08-29T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/computer-forensics/</loc><lastmod>2025-08-29T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/cybersecurity/</loc><lastmod>2025-08-29T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/data-recovery/</loc><lastmod>2025-08-29T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/digital-forensics/</loc><lastmod>2025-08-29T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/file-system-analysis/</loc><lastmod>2025-08-29T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/forensic-technology/</loc><lastmod>2025-08-29T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/investigative-tools/</loc><lastmod>2025-08-29T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/volume-shadow-copies/</loc><lastmod>2025-08-29T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/vss/</loc><lastmod>2025-08-29T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/amcache/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/anti-forensics/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/cloud-integration/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/correlation-techniques/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/data-exfiltration/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/windows_forensic_artifact_master_list/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/enterprise-forensics/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/eric-zimmerman/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/event-logs/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/execution-evidence/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/kape/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/memory-analysis/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/persistence-mechanisms/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/prefetch/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/registry-analysis/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/srum/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/threat-hunting/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/timeline-analysis/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/volatility/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/windows-11/</loc><lastmod>2025-08-25T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/logfile_and_usnjrnl/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/correlation/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/duckdb/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/filesystem-analysis/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/forensics/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/metadata/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/ntfs/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/ransomware/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/sql/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/timestomping/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/transactional-analysis/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/windows/</loc><lastmod>2025-08-24T15:30:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/kape/</loc><lastmod>2025-08-23T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/kroll/</loc><lastmod>2025-08-23T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/command-line-tools/</loc><lastmod>2025-08-22T00:00:00-05:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/malware-analysis/</loc><lastmod>2025-08-22T00:00:00-05:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/mastering-mft-forensic-analysis-mftecmd/</loc><lastmod>2025-08-22T00:00:00-05:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/mftecmd/</loc><lastmod>2025-08-22T00:00:00-05:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/timeline/</loc><lastmod>2025-08-22T00:00:00-05:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/zimmerman-tools/</loc><lastmod>2025-08-22T00:00:00-05:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/windows-file-system-forensics/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/ads/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/file-system/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/logfile/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/mft/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/ntfs-triforce/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/usnjrnl/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/categories/advanced-techniques/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/automation/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/correlation-analysis/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/expert-testimony/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/memory-forensics/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/ntfs-mft-advanced-forensic-analysis-guide/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/tool-validation/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/categories/windows-analysis/</loc><lastmod>2025-08-21T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/dead-disk/</loc><lastmod>2025-08-18T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/dead-disk-vs-live-response-forensics-guide/</loc><lastmod>2025-08-18T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/esxi/</loc><lastmod>2025-08-18T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/imaging/</loc><lastmod>2025-08-18T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/linux/</loc><lastmod>2025-08-18T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/live-response/</loc><lastmod>2025-08-18T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/macos/</loc><lastmod>2025-08-18T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/vmware/</loc><lastmod>2025-08-18T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/powershell/</loc><lastmod>2025-08-17T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/rust/</loc><lastmod>2025-08-17T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/security-engineering/</loc><lastmod>2025-08-17T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/tags/tooling/</loc><lastmod>2025-08-17T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/posts/why-deaddisk-exists/</loc><lastmod>2025-08-17T00:00:00+00:00</lastmod></url><url><loc>https://www.deaddisk.com/about/</loc></url></urlset>