<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://threathunter-chronicles.com/blog/logwatchers-zenit/threathunter-chronicles.html</loc>
<lastmod>2025-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/logwatchers-zenit/vscode-for-analysts-part-1.html</loc>
<lastmod>2025-05-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/side-quests/how-to-virtualise-sequoia.html</loc>
<lastmod>2025-06-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/dirty-bits/dark-theme-in-sandbox.html</loc>
<lastmod>2025-06-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/logwatchers-zenit/simulating-attacks-with-atomic-red-team.html</loc>
<lastmod>2025-06-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/logwatchers-zenit/histogram-the-weight-measurement-of-logs.html</loc>
<lastmod>2025-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/logwatchers-zenit/vscode-for-analysts-part-2.html</loc>
<lastmod>2025-06-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/logwatchers-zenit/beginner-mistakes-in-kql.html</loc>
<lastmod>2025-07-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/logwatchers-zenit/summiting-the-pyramid.html</loc>
<lastmod>2025-07-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/side-quests/vmware-tools-in-fusion.html</loc>
<lastmod>2025-07-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/kqlture-club/the-heart-of-the-company.html</loc>
<lastmod>2025-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/logwatchers-zenit/let-there-be-let.html</loc>
<lastmod>2025-08-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/logwatchers-zenit/tombs-telemetry-parsing.html</loc>
<lastmod>2025-11-18T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/categories.html</loc>
<lastmod>2025-11-18T16:00:54+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/tags.html</loc>
<lastmod>2025-11-18T16:00:54+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/archives.html</loc>
<lastmod>2025-11-18T16:00:54+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/blog/about.html</loc>
<lastmod>2025-11-18T16:00:54+00:00</lastmod>
</url>
<url>
<loc>https://threathunter-chronicles.com/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/threat-hunting/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/threat-detection/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/incident-response/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/cybersecurity/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/visualstudio-code/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/key-commands/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/macos/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/sequoia/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/virtualisation/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/tips-n-tricks/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/operating-systems/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/dark-mode/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/dark-theme/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/windows/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/sandbox/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/log-analysis/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/kql/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/mitre-attack/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/virtual-machines/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/vmware/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/tags/emojis/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/categories/logwatchers-zenit/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/categories/side-quests/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/categories/dirty-bits/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/categories/kqlture-club/</loc>
</url>
<url>
<loc>https://threathunter-chronicles.com/page2/</loc>
</url>
</urlset>
