<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://aimod2.com/docs/01-Introduction-to-AIMOD2/intro/</loc>
    <lastmod>2023-06-25T21:23:32+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/06-Battlefield-Intel/intro-to-battlefield-intel/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/04-Threat-Hunt-Mission-Types/external-attack-vector-discovery/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/05-Active-Defence-Adversarial-Cyber-Operations/intro-to-adversarial-cyber-ops-copy/</loc>
    <lastmod>2023-06-25T21:35:57+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/01-Introduction-to-AIMOD2/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/03-Data-Semantics/intro-to-data-semantics/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/02-Threat-Hunting-Missions/what-are-threat-hunting-missions/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/05-Active-Defence-Adversarial-Cyber-Operations/the-four-domains-01/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/03-Data-Semantics/daiki-the-semantic-chain/</loc>
    <lastmod>2023-06-25T21:35:57+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/02-Threat-Hunting-Missions/three-layers-of-hunt-missions/</loc>
    <lastmod>2023-06-25T21:35:57+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/02-Threat-Hunting-Missions/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/02-Threat-Hunting-Missions/threat-hunting-mission-structure/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/03-Data-Semantics/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/05-Active-Defence-Adversarial-Cyber-Operations/the-four-domains-02/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/03-Data-Semantics/daiki-applied-to-threat-hunting/</loc>
    <lastmod>2023-06-25T21:35:57+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/02-Threat-Hunting-Missions/threat-hunting-outcomes/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/04-Threat-Hunt-Mission-Types/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/05-Active-Defence-Adversarial-Cyber-Operations/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/docs/06-Battlefield-Intel/</loc>
    <lastmod>2023-06-20T17:07:33+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/categories/</loc>
  </url><url>
    <loc>https://aimod2.com/docs/</loc>
    <lastmod>2023-06-25T21:35:57+10:00</lastmod>
  </url><url>
    <loc>https://aimod2.com/tags/</loc>
  </url><url>
    <loc>https://aimod2.com/</loc>
    <lastmod>2023-06-20T17:08:44+10:00</lastmod>
  </url>
</urlset>
