<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//ajakcyberacademy.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-htmli-2/</loc>
		<lastmod>2026-01-20T20:01:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-reflected-htmli-2/</loc>
		<lastmod>2026-01-20T20:01:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-stored-htmli-2/</loc>
		<lastmod>2026-01-20T20:01:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/private-pocs-live-htmli-2/</loc>
		<lastmod>2026-01-20T20:01:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/htmli-task-sheet-2/</loc>
		<lastmod>2026-01-20T20:01:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/xss-workflow-2/</loc>
		<lastmod>2026-01-20T20:20:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/introduction-to-reflected-xss-2/</loc>
		<lastmod>2026-01-20T20:20:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/rxss-on-lab-2/</loc>
		<lastmod>2026-01-20T20:21:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/rxss-on-simulation-2/</loc>
		<lastmod>2026-01-20T20:21:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-2/</loc>
		<lastmod>2026-01-20T20:21:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-balancing-queries-i-2/</loc>
		<lastmod>2026-01-20T20:21:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-balancing-queries-ii-2/</loc>
		<lastmod>2026-01-20T20:21:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-closing-script-tag-manually-2/</loc>
		<lastmod>2026-01-20T20:21:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-waf-bypass-script-tag-2/</loc>
		<lastmod>2026-01-20T20:22:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-queries-exploitation-2/</loc>
		<lastmod>2026-01-20T20:22:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-403-bypass-2/</loc>
		<lastmod>2026-01-20T20:22:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-forbidden-keywords-automation-2/</loc>
		<lastmod>2026-01-20T20:23:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-403-forbidden-bypass-live-automation-2/</loc>
		<lastmod>2026-01-20T20:23:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-on-email-parameter-2/</loc>
		<lastmod>2026-01-20T20:23:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-on-header-2/</loc>
		<lastmod>2026-01-20T20:23:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-to-iframe-2/</loc>
		<lastmod>2026-01-20T20:23:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-to-open-redirection-2/</loc>
		<lastmod>2026-01-20T20:23:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-polyglots-payloads-2/</loc>
		<lastmod>2026-01-20T20:24:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-cookie-stealing-live-2/</loc>
		<lastmod>2026-01-20T20:24:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rxss-automation-live-2/</loc>
		<lastmod>2026-01-20T20:24:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/private-pocs-rxss-2/</loc>
		<lastmod>2026-01-20T20:24:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/public-blogs-rxss-2/</loc>
		<lastmod>2026-01-20T20:24:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/stored-xss-workflow-2/</loc>
		<lastmod>2026-01-20T20:25:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/stored-xss-on-lab-2/</loc>
		<lastmod>2026-01-20T20:25:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/stored-xss-on-simulation-2/</loc>
		<lastmod>2026-01-20T20:25:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-on-ticket-feature-stored-xss-2/</loc>
		<lastmod>2026-01-20T20:25:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-on-author-stored-xss-2/</loc>
		<lastmod>2026-01-20T20:25:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-cloudflare-bypass-stored-xss-2/</loc>
		<lastmod>2026-01-20T20:25:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/private-pocs-live-stored-xss-2/</loc>
		<lastmod>2026-01-20T20:25:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/hackerone-reports-stored-xss-2/</loc>
		<lastmod>2026-01-20T20:26:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/private-pocs-live-blind-xss-2/</loc>
		<lastmod>2026-01-20T20:26:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/blind-xss-public-blogs-2/</loc>
		<lastmod>2026-01-20T20:26:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/dom-xss-workflow-2/</loc>
		<lastmod>2026-01-20T20:26:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/dom-xss-pocs-live-2/</loc>
		<lastmod>2026-01-20T20:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/xss-task-sheet-2/</loc>
		<lastmod>2026-01-20T20:27:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-workflow-open-redirection-2/</loc>
		<lastmod>2026-01-21T04:51:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-open-redirection-2/</loc>
		<lastmod>2026-01-21T04:51:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/open-redirect-oauth-stealing-poc-2/</loc>
		<lastmod>2026-01-21T04:51:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/host-header-injection-workflow-2/</loc>
		<lastmod>2026-01-21T04:51:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-host-header-injection-2/</loc>
		<lastmod>2026-01-21T04:51:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-password-reset-poisoning-2/</loc>
		<lastmod>2026-01-21T04:52:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/open-redirect-to-xss-live-poc-2/</loc>
		<lastmod>2026-01-21T04:52:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/public-blogs-open-redirect-2/</loc>
		<lastmod>2026-01-21T04:52:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/open-redirect-task-sheet-2/</loc>
		<lastmod>2026-01-21T04:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/exif-metadata-workflow-2/</loc>
		<lastmod>2026-01-21T04:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-exif-2/</loc>
		<lastmod>2026-01-21T04:53:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/ddos-workflow-2/</loc>
		<lastmod>2026-01-21T04:54:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/business-logic-ddos-blogs-2/</loc>
		<lastmod>2026-01-21T04:54:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/os-command-injection-workflow-2/</loc>
		<lastmod>2026-01-21T04:56:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/how-to-take-reverse-shell-2/</loc>
		<lastmod>2026-01-21T04:56:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/lab-os-command-injection-2/</loc>
		<lastmod>2026-01-21T04:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-os-command-injection-2/</loc>
		<lastmod>2026-01-21T04:56:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/pocs-os-command-injection-2/</loc>
		<lastmod>2026-01-21T04:56:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rce-via-cve-2/</loc>
		<lastmod>2026-01-21T04:57:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/poc-jenkins-rce-2/</loc>
		<lastmod>2026-01-21T04:57:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/react2shell-workflow-2/</loc>
		<lastmod>2026-01-21T04:57:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-react2shell-2/</loc>
		<lastmod>2026-01-21T04:57:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/ai-prompt-injection-rce-2/</loc>
		<lastmod>2026-01-21T04:57:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/file-upload-workflow-2/</loc>
		<lastmod>2026-01-21T04:58:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-file-upload-exploitation-2/</loc>
		<lastmod>2026-01-21T04:58:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/labs-file-upload-2/</loc>
		<lastmod>2026-01-21T04:59:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-stored-xss-via-file-upload-2/</loc>
		<lastmod>2026-01-21T04:59:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/poc-file-upload-to-rce-2/</loc>
		<lastmod>2026-01-21T04:59:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/file-upload-task-sheet-2/</loc>
		<lastmod>2026-01-21T04:59:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/lfi-workflow-2/</loc>
		<lastmod>2026-01-21T05:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/lab-lfi-2/</loc>
		<lastmod>2026-01-21T05:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/lfi-poc-live-2/</loc>
		<lastmod>2026-01-21T05:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/rfi-workflow-2/</loc>
		<lastmod>2026-01-21T05:00:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/rfi-poc-live-2/</loc>
		<lastmod>2026-01-21T05:00:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/ssti-workflow-2/</loc>
		<lastmod>2026-01-21T05:01:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-ssti-on-chatbox-2/</loc>
		<lastmod>2026-01-21T05:12:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/ssti-on-lab-2/</loc>
		<lastmod>2026-01-21T05:12:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/ssti-poc-live-2/</loc>
		<lastmod>2026-01-21T05:12:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/ssti-task-sheet-2/</loc>
		<lastmod>2026-01-21T05:12:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/sensitive-info-workflow-2/</loc>
		<lastmod>2026-01-21T05:13:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-sensitive-info-2/</loc>
		<lastmod>2026-01-21T05:13:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-google-dorks-to-sensitive-info-2/</loc>
		<lastmod>2026-01-21T05:13:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-firebase-pii-data-leak-2/</loc>
		<lastmod>2026-01-21T05:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-remove-subscriptions-via-google-dork-2/</loc>
		<lastmod>2026-01-21T05:14:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-sensitive-info-via-directory-listing-2/</loc>
		<lastmod>2026-01-21T05:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-apache-server-status-leak-2/</loc>
		<lastmod>2026-01-21T05:14:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/exploiting-wordpress-2/</loc>
		<lastmod>2026-01-21T05:14:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/reporting-workflow-2/</loc>
		<lastmod>2026-01-21T05:15:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/how-to-write-a-bug-bounty-report-like-a-pro-2/</loc>
		<lastmod>2026-01-21T05:15:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/how-to-report-a-bug-in-indian-govt-website-2/</loc>
		<lastmod>2026-01-21T05:15:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/choosing-wider-scope-2/</loc>
		<lastmod>2026-01-21T05:15:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/points-splitage-for-vulnerabilities-2/</loc>
		<lastmod>2026-01-21T05:15:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/task-sheet-reporting-2/</loc>
		<lastmod>2026-01-21T05:16:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/how-to-secure-job-as-a-fresher-2/</loc>
		<lastmod>2026-01-21T05:16:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/claim-your-certificate-11/</loc>
		<lastmod>2026-01-21T05:16:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/see-you-again-2/</loc>
		<lastmod>2026-01-21T05:17:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/sql-injection-workflow-2/</loc>
		<lastmod>2026-01-21T05:20:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-sqli-error-balancing-techniques-2/</loc>
		<lastmod>2026-01-21T05:20:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/union-sqli-overview-2/</loc>
		<lastmod>2026-01-21T05:21:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/union-sqli-on-simulation-site-2/</loc>
		<lastmod>2026-01-21T05:21:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-union-based-sqli-2/</loc>
		<lastmod>2026-01-21T05:21:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/union-based-sqli-private-pocs-live-2/</loc>
		<lastmod>2026-01-21T05:21:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/error-based-sqli-overview-2/</loc>
		<lastmod>2026-01-21T05:21:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/error-based-sqli-on-simulation-2/</loc>
		<lastmod>2026-01-21T05:21:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-error-based-sqli-2/</loc>
		<lastmod>2026-01-21T05:22:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/error-based-sqli-private-pocs-live-2/</loc>
		<lastmod>2026-01-21T05:22:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/boolean-sqli-overview-2/</loc>
		<lastmod>2026-01-21T05:22:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-boolean-based-sqli-2/</loc>
		<lastmod>2026-01-21T05:22:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/boolean-based-sqli-on-simulation-2/</loc>
		<lastmod>2026-01-21T05:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/boolean-based-sqli-private-pocs-live-2/</loc>
		<lastmod>2026-01-21T05:23:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/time-based-sqli-overview-2/</loc>
		<lastmod>2026-01-21T05:23:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-time-based-sqli-2/</loc>
		<lastmod>2026-01-21T05:23:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/sqlmap-automation-2/</loc>
		<lastmod>2026-01-21T05:23:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/authentication-bypass-login-overview-2/</loc>
		<lastmod>2026-01-21T05:23:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-authentication-bypass-login-2/</loc>
		<lastmod>2026-01-21T05:24:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/authentication-bypass-public-blogs-2/</loc>
		<lastmod>2026-01-21T05:24:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/sql-injection-tasksheet-2/</loc>
		<lastmod>2026-01-21T05:24:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/auth-flaw-workflow-2/</loc>
		<lastmod>2026-01-21T06:26:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-chaining-user-enum-2/</loc>
		<lastmod>2026-01-21T06:26:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/rate-limit-workflow-2/</loc>
		<lastmod>2026-01-21T06:26:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-server-side-email-flooding-2/</loc>
		<lastmod>2026-01-21T06:27:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-client-side-email-flooding-2/</loc>
		<lastmod>2026-01-21T06:27:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-email-flooding-on-nasa-2/</loc>
		<lastmod>2026-01-21T06:27:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-no-database-exist-flooding-2/</loc>
		<lastmod>2026-01-21T06:27:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-no-rate-limit-in-google-classroom-2/</loc>
		<lastmod>2026-01-21T06:27:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-otp-bypass-4digit-2/</loc>
		<lastmod>2026-01-21T06:27:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-otp-bypass-to-full-ato-2/</loc>
		<lastmod>2026-01-21T06:28:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-rate-limit-bypass-via-ip-rotate-2/</loc>
		<lastmod>2026-01-21T06:28:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-no-rate-limit-clubcard-bypass-2/</loc>
		<lastmod>2026-01-21T06:28:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/race-condition-bug-workflow-2/</loc>
		<lastmod>2026-01-21T06:29:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-race-condition-on-edit-profile-2/</loc>
		<lastmod>2026-01-21T06:29:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/response-manipulation-workflow-2/</loc>
		<lastmod>2026-01-21T06:29:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-response-manipulation-1-2/</loc>
		<lastmod>2026-01-21T06:29:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-response-manipulation-2-2/</loc>
		<lastmod>2026-01-21T06:29:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/poc-response-manipulation-2fa-bypass-2/</loc>
		<lastmod>2026-01-21T06:29:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-response-manipulation-on-header-2/</loc>
		<lastmod>2026-01-21T06:30:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-response-manipulation-via-null-method-2/</loc>
		<lastmod>2026-01-21T06:30:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/response-manipulation-pocs-live-2/</loc>
		<lastmod>2026-01-21T06:30:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-otp-leakage-in-response-2/</loc>
		<lastmod>2026-01-21T06:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-full-ato-via-resend-otp-2/</loc>
		<lastmod>2026-01-21T06:31:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-captcha-bypass-2/</loc>
		<lastmod>2026-01-21T06:31:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/price-manipulation-workflow-2/</loc>
		<lastmod>2026-01-21T06:31:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-price-manipulation-i-2/</loc>
		<lastmod>2026-01-21T06:32:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-price-manipulation-ii-2/</loc>
		<lastmod>2026-01-21T06:32:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-access-premium-features-2/</loc>
		<lastmod>2026-01-21T06:32:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-email-bypass-via-guessable-tokens-2/</loc>
		<lastmod>2026-01-21T06:32:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-nasa-email-bypass-2/</loc>
		<lastmod>2026-01-21T06:33:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-3rd-party-token-leakage-via-referrer-header-2/</loc>
		<lastmod>2026-01-21T06:33:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-permanent-lockout-of-users-via-2fa-2/</loc>
		<lastmod>2026-01-21T06:33:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-permanent-lockout-of-users-with-known-credentials-2/</loc>
		<lastmod>2026-01-21T06:33:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-admin-panel-bypass-via-default-credentials-2/</loc>
		<lastmod>2026-01-21T06:33:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-admin-panel-bypass-via-forced-browsing-2/</loc>
		<lastmod>2026-01-21T06:33:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-red-bull-tickets-disruptions-via-business-logic-2/</loc>
		<lastmod>2026-01-21T06:34:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-unauth-access-to-e-learning-portal-via-business-logic-2/</loc>
		<lastmod>2026-01-21T06:34:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/live-hunting-multiple-business-logic-flaw-2/</loc>
		<lastmod>2026-01-21T06:34:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/task-sheet-authentication-2/</loc>
		<lastmod>2026-01-21T06:34:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/bug-flaw-status-3/</loc>
		<lastmod>2026-01-21T06:42:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/bugcrowd-vrt-3/</loc>
		<lastmod>2026-01-21T06:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/what-bug-bounty-offers-3/</loc>
		<lastmod>2026-01-21T06:44:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/output-of-the-session-3/</loc>
		<lastmod>2026-01-21T06:45:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/my-personal-tips-for-bug-bounty-3/</loc>
		<lastmod>2026-01-21T06:46:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-english/lesson/access-private-ctf-lab/</loc>
		<lastmod>2026-02-02T18:57:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://ajakcyberacademy.com/courses/bug-bounty-tamil/lesson/access-private-ctf-labs/</loc>
		<lastmod>2026-02-02T18:58:56+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->