<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Red Team Notes on Cyberah</title><link>https://cyberah-blog.pages.dev/en/notes/</link><description>Recent content in Red Team Notes on Cyberah</description><generator>Hugo</generator><language>en</language><copyright>2026 Cyberah</copyright><lastBuildDate>Sun, 19 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://cyberah-blog.pages.dev/en/notes/index.xml" rel="self" type="application/rss+xml"/><item><title>Web Penetration Testing Methodology — Zero to Pwned</title><link>https://cyberah-blog.pages.dev/en/notes/methodology-web-pentest/</link><pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate><guid>https://cyberah-blog.pages.dev/en/notes/methodology-web-pentest/</guid><description>A comprehensive methodological guide for web application penetration testing, from reconnaissance to final report</description></item></channel></rss>