<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://m0rt0n86.com/dfir/</loc><lastmod>2023-04-06T12:21:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://m0rt0n86.com/2022/10/29/analytical-lifting-how-olympic-weightlifting-helped-with-my-ir-workflows-analysis/</loc><lastmod>2023-04-06T12:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m0rt0n86.com/blog/</loc><lastmod>2022-10-29T20:02:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://m0rt0n86.com/2021/08/27/ir-what-i-wish-i-knew-a-year-ago/</loc><lastmod>2022-10-29T16:34:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m0rt0n86.com/resources/</loc><lastmod>2022-06-05T16:02:07+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://m0rt0n86.com/2020/11/02/is-this-thing-on/</loc><lastmod>2020-11-02T21:55:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m0rt0n86.com/2020/09/06/so-long-and-thanks-for-the-response-why-are-we-skipping-post-incident-activities/</loc><lastmod>2020-09-06T15:06:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m0rt0n86.com/2020/08/26/def-con-28-def-con-safe-mode/</loc><image:image><image:loc>https://m0rt0n86.com/wp-content/uploads/2020/08/ee8oynvxyaejtan.jpg</image:loc><image:title>Ee8oynVXYAEjTAn</image:title></image:image><lastmod>2020-08-26T00:43:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m0rt0n86.com/2020/08/02/wild-west-hackin-fest-black-hills-information-security-intro-to-security-04-day/</loc><lastmod>2020-08-02T22:41:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m0rt0n86.com/2020/07/30/wild-west-hackin-fest-black-hills-information-security-intro-to-security-03-day/</loc><lastmod>2020-07-30T16:46:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m0rt0n86.com/2020/07/29/wild-west-hackin-fest-black-hills-information-security-introduction-to-security-02day/</loc><lastmod>2020-07-29T15:28:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m0rt0n86.com/2020/01/26/bhis-cyber-deception/</loc><lastmod>2020-07-27T23:30:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m0rt0n86.com/2020/07/27/wild-west-hackin-fest-black-hills-information-security-introduction-to-security-01day/</loc><lastmod>2021-03-30T15:37:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://m0rt0n86.com/blog-feed/</loc><lastmod>2020-01-26T16:14:03+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://m0rt0n86.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-04-06T12:21:02+00:00</lastmod></url></urlset>
