<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  
    <url>
      <loc>https://ibrahimsql.com/posts/en-api-access-control-test-plan</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Your%20API%20Has%20Roles.%20That%20Does%20Not%20Mean%20Access%20Control%20Works</image:loc>
        <image:title>Your API Has Roles. That Does Not Mean Access Control Works</image:title>
        <image:caption>A practical test plan for object-level authorization, tenant isolation, and API access control bugs that survive happy-path role checks.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/en-nextjs-private-pages-noindex-is-not-auth</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Noindex%20Is%20Not%20Auth%3A%20Protecting%20Private%20Pages%20in%20Next.js</image:loc>
        <image:title>Noindex Is Not Auth: Protecting Private Pages in Next.js</image:title>
        <image:caption>How to separate link-only pages from truly private content in Next.js App Router using robots metadata, middleware, server actions, and HttpOnly cookies.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/tr-api-yetkilendirme-hatalari</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=API%20Yetkilendirme%20Hatalar%C4%B1%3A%20IDOR'u%20UUID%20ile%20%C3%87%C3%B6zd%C3%BC%C4%9F%C3%BCn%C3%BC%20Sanma</image:loc>
        <image:title>API Yetkilendirme Hataları: IDOR&apos;u UUID ile Çözdüğünü Sanma</image:title>
        <image:caption>API güvenliğinde en pahalı hata genelde authentication değil authorization tarafında çıkar. IDOR, tenant izolasyonu ve obje bazlı kontrol için pratik bir test planı.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/tr-nextjs-middleware-ile-ozel-sayfa-koruma</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Next.js'te%20%C3%96zel%20Sayfa%20Koruma%3A%20Noindex%20Yetmez%2C%20Server%20Taraf%C4%B1nda%20Kilitle</image:loc>
        <image:title>Next.js&apos;te Özel Sayfa Koruma: Noindex Yetmez, Server Tarafında Kilitle</image:title>
        <image:caption>Linki bilenlerin görebileceği sayfalar ile gerçekten şifreli alanlar farklı şeylerdir. Next.js App Router&apos;da noindex, middleware ve HttpOnly cookie ile pratik bir koruma modeli.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/tr-burp-suite-lab-rehberi</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Burp%20Suite%20ile%20G%C3%BCvenli%20Lab%20%C3%87al%C4%B1%C5%9Fmas%C4%B1%3A%20Ba%C5%9Flang%C4%B1%C3%A7%20Rehberi</image:loc>
        <image:title>Burp Suite ile Güvenli Lab Çalışması: Başlangıç Rehberi</image:title>
        <image:caption>Burp Suite öğrenirken yasal, kontrollü ve tekrar edilebilir bir laboratuvar düzeni kurmak için temel yaklaşım.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/tr-guvenli-nextjs-uygulama-yapisi</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=G%C3%BCvenli%20Next.js%20Uygulama%20Yap%C4%B1s%C4%B1%3A%20K%C3%BC%C3%A7%C3%BCk%20Ekipler%20%C4%B0%C3%A7in%20Pratik%20Kontrol%20Listesi</image:loc>
        <image:title>Güvenli Next.js Uygulama Yapısı: Küçük Ekipler İçin Pratik Kontrol Listesi</image:title>
        <image:caption>Next.js projelerinde rota, environment değişkenleri, form güvenliği ve SEO temellerini aynı anda sağlamlaştırmak için uygulanabilir bir rehber.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/tr-siber-guvenlik-risk-modeli</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Siber%20G%C3%BCvenlikte%20Risk%20Modeli%3A%20%C3%96nce%20Neyi%20Korumal%C4%B1%3F</image:loc>
        <image:title>Siber Güvenlikte Risk Modeli: Önce Neyi Korumalı?</image:title>
        <image:caption>Siber güvenlik çalışmalarını rastgele araç denemelerinden çıkarıp ölçülebilir bir risk modeline bağlamak için pratik bir yaklaşım.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/tr-terminal-ag-araclari-cheatsheet</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Terminal%20ve%20A%C4%9F%20Ara%C3%A7lar%C4%B1%20Cheatsheet%3A%20G%C3%BCnl%C3%BCk%20G%C3%BCvenlik%20%C4%B0%C5%9F%20Ak%C4%B1%C5%9F%C4%B1</image:loc>
        <image:title>Terminal ve Ağ Araçları Cheatsheet: Günlük Güvenlik İş Akışı</image:title>
        <image:caption>Günlük güvenlik çalışmalarında terminal, ağ gözlemi ve dokümantasyon için kullanılan temel araç kategorileri.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/metasploit-framework-guide</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Metasploit%20Framework%3A%20The%20Complete%20Guide%202025</image:loc>
        <image:title>Metasploit Framework: The Complete Guide 2025</image:title>
        <image:caption>A deep dive into the Metasploit Framework, the world&apos;s most used penetration testing software. Learn how to exploit vulnerabilities and manage sessions.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/burp-suite-beginners</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Mastering%20Burp%20Suite%3A%20The%20Ultimate%20Guide%20for%20Beginners%20(2025)</image:loc>
        <image:title>Mastering Burp Suite: The Ultimate Guide for Beginners (2025)</image:title>
        <image:caption>A comprehensive deep dive into Burp Suite. Learn how to configure, intercept, and exploit web applications using Proxy, Repeater, Intruder, and Extensions.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/wireshark-guide</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Wireshark%3A%20The%20Microscope%20for%20Your%20Network</image:loc>
        <image:title>Wireshark: The Microscope for Your Network</image:title>
        <image:caption>How to capture and analyze network traffic with Wireshark. Essential filters and techniques for spotting malicious activity.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/owasp-top-10-guide</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Understanding%20OWASP%20Top%2010%3A%20The%20Bible%20of%20Web%20Vulnerabilities</image:loc>
        <image:title>Understanding OWASP Top 10: The Bible of Web Vulnerabilities</image:title>
        <image:caption>A breakdown of the most critical web application security risks. From Broken Access Control to Injection, learn what they are and how to prevent them.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/top-10-bug-bounty-tools</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Top%2010%20Essential%20Tools%20for%20Bug%20Bounty%20Hunting%20in%202025</image:loc>
        <image:title>Top 10 Essential Tools for Bug Bounty Hunting in 2025</image:title>
        <image:caption>A comprehensive guide to the most powerful tools used by bug bounty hunters and penetration testers, including Burp Suite, SQLmap, and Shodan.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/ios-android-hacking-guide</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=iOS%20and%20Android%20Hacking%20Guide%202025%3A%20Mobile%20App%20Penetration%20Testing</image:loc>
        <image:title>iOS and Android Hacking Guide 2025: Mobile App Penetration Testing</image:title>
        <image:caption>Master mobile application security. Learn how to decompile APKs, bypass jailbreak detection, and intercept SSL traffic on iOS and Android devices.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/wordpress-exploitation-guide-2025</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=WordPress%20Exploitation%202025%3A%20Uncovering%20Critical%20Vulnerabilities%20in%20the%20World's%20Most%20Popular%20CMS</image:loc>
        <image:title>WordPress Exploitation 2025: Uncovering Critical Vulnerabilities in the World&apos;s Most Popular CMS</image:title>
        <image:caption>Learn how to identify and exploit critical WordPress vulnerabilities in 2025. A deep dive into plugin exploits, theme vulnerabilities, and core misconfigurations for ethical hackers and bug bounty hunters.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/aws-cloud-penetration-testing-secrets</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=AWS%20Cloud%20Penetration%20Testing%20Secrets%3A%20Hacking%20the%20Cloud%20in%202025</image:loc>
        <image:title>AWS Cloud Penetration Testing Secrets: Hacking the Cloud in 2025</image:title>
        <image:caption>Unlock the secrets of AWS penetration testing. Learn how to exploit S3 buckets, IAM misconfigurations, and Lambda functions to compromise cloud infrastructure.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/zero-day-exploit-development-tutorial</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Zero-Day%20Exploit%20Development%3A%20From%20Fuzzing%20to%20Shell%20in%202025</image:loc>
        <image:title>Zero-Day Exploit Development: From Fuzzing to Shell in 2025</image:title>
        <image:caption>A technical deep dive into finding and exploiting zero-day vulnerabilities. Learn about fuzzing, reverse engineering, and bypassing modern memory protections like ASLR and DEP.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/social-engineering-masterclass</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Social%20Engineering%20Masterclass%3A%20Hacking%20the%20Human%20Firewall</image:loc>
        <image:title>Social Engineering Masterclass: Hacking the Human Firewall</image:title>
        <image:caption>Technology can be patched, human nature cannot. Learn the psychological triggers behind phishing, vishing, and physical breaches in this 2025 masterclass.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/penetration-testing-roadmap-2025</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Getting%20Started%20with%20Penetration%20Testing%3A%20A%20Roadmap%20for%202025</image:loc>
        <image:title>Getting Started with Penetration Testing: A Roadmap for 2025</image:title>
        <image:caption>Want to become an ethical hacker? This roadmap outlines the essential skills, certifications, and tools you need to start your career in penetration testing in 2025.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/xss-comprehensive-guide</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Mastering%20Cross-Site%20Scripting%20(XSS)%3A%20A%20Comprehensive%20Guide%20for%202025</image:loc>
        <image:title>Mastering Cross-Site Scripting (XSS): A Comprehensive Guide for 2025</image:title>
        <image:caption>Dive deep into Cross-Site Scripting (XSS). Learn about Reflected, Stored, and DOM-based XSS, how to exploit them, and the best practices for securing your applications.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/sql-injection-mastery</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=The%20Ultimate%20Guide%20to%20SQL%20Injection%20(SQLi)%20in%202025%3A%20Detection%2C%20Exploitation%2C%20and%20Prevention</image:loc>
        <image:title>The Ultimate Guide to SQL Injection (SQLi) in 2025: Detection, Exploitation, and Prevention</image:title>
        <image:caption>Master SQL Injection (SQLi) with this comprehensive guide. Learn advanced exploitation techniques, WAF bypass methods, and robust prevention strategies for modern web applications.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/web-hacking-101-2025</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Web%20Hacking%20101%20in%202025%3A%20The%20Modern%20Landscape</image:loc>
        <image:title>Web Hacking 101 in 2025: The Modern Landscape</image:title>
        <image:caption>A comprehensive overview of the web hacking landscape in 2025. From client-side attacks to server-side vulnerabilities, learn what every ethical hacker needs to know.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/attacking-secondary-contexts</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Attacking%20Secondary%20Contexts%20in%20Web%20Applications</image:loc>
        <image:title>Attacking Secondary Contexts in Web Applications</image:title>
        <image:caption>Vulnerabilities often hide in the shadows. Learn how to exploit secondary contexts like log files, admin panels, and background jobs.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/waf-bypass-unicode</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Bypassing%20WAFs%20with%20Unicode%20Compatibility</image:loc>
        <image:title>Bypassing WAFs with Unicode Compatibility</image:title>
        <image:caption>Modern WAFs are tough, but Unicode normalization can be their undoing. Learn how to use compatibility characters to sneak payloads past security filters.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/ai-security-testing</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Enhancing%20Security%20Testing%20with%20AI%20(LLM)</image:loc>
        <image:title>Enhancing Security Testing with AI (LLM)</image:title>
        <image:caption>Large Language Models are changing the game. Discover how to use AI to generate payloads, analyze code, and automate vulnerability detection.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/prototype-pollution-2025</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Prototype%20Pollution%20in%202025%3A%20Still%20a%20Threat</image:loc>
        <image:title>Prototype Pollution in 2025: Still a Threat</image:title>
        <image:caption>Prototype Pollution is a JavaScript-specific vulnerability that can lead to XSS, RCE, and DoS. Learn how it works and how to detect it in modern libraries.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/smart-contract-auditing</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Smart%20Contract%20Auditing%3A%20Securing%20the%20Blockchain</image:loc>
        <image:title>Smart Contract Auditing: Securing the Blockchain</image:title>
        <image:caption>Web3 security is booming. Learn the basics of auditing Solidity smart contracts, common vulnerabilities like Reentrancy, and tools like Slither and Mythril.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/zap-2-16-review</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=ZAP%202.16%20Review%3A%20The%20Open%20Source%20Scanner%20Evolves</image:loc>
        <image:title>ZAP 2.16 Review: The Open Source Scanner Evolves</image:title>
        <image:caption>A detailed review of OWASP ZAP 2.16. New features, performance improvements, and why it&apos;s a serious competitor to paid scanners.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/automating-dead-link-detection</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Automating%20Dead%20Link%20Detection%20for%20Security</image:loc>
        <image:title>Automating Dead Link Detection for Security</image:title>
        <image:caption>Dead links aren&apos;t just a UX problem; they are a security risk. Learn how broken links can lead to subdomain takeovers and phishing attacks.</image:caption>
      </image:image>
    </url>

    <url>
      <loc>https://ibrahimsql.com/posts/hidden-xss-no-interaction</loc>
      <image:image>
        <image:loc>https://ibrahimsql.com/api/og?title=Hidden%20XSS%3F%20No%20User%20Interaction!</image:loc>
        <image:title>Hidden XSS? No User Interaction!</image:title>
        <image:caption>Discover the dangerous world of zero-interaction XSS. How payloads in metadata, filenames, and API responses can trigger without a single click.</image:caption>
      </image:image>
    </url>
</urlset>