<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    <url>
         <loc>https://functions.dev.oligo.security/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/_index/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/about/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/attacks/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/bybit/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/contributors/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/tactics/Deepening%20Control/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/tactics/Expanding%20Control/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/tactics/Gain%20Access/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/tactics/Impact/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/tactics/Payload%20Execution/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/tactics/Reconnaissance/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/tactics/Resource%20Development/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/C2%20over%20App-Protocols/C2%20over%20App-Protocols/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/C2%20over%20App-Protocols/subtechniques/%20DNS%20Protocols/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/C2%20over%20App-Protocols/subtechniques/File%20Transfer%20Protocols/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/C2%20over%20App-Protocols/subtechniques/Web%20Protocols/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Disable%20Runtime%20Protection%20Service/Disable%20Runtime%20Protection%20Service/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Disable%20Runtime%20Protection%20Service/subtechniques/Bypassing%20Security%20Hooks/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Disable%20Runtime%20Protection%20Service/subtechniques/Configuration%20Tampering/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Disable%20Runtime%20Protection%20Service/subtechniques/Service%20Downgrade/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Disable%20Runtime%20Protection%20Service/subtechniques/Service%20Termination/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Defense%20Evasion/Exploitation%20for%20Defense%20Evasion/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Defense%20Evasion/subtechniques/Hijacking/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Defense%20Evasion/subtechniques/Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Defense%20Evasion/subtechniques/Proc%20Memory/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Defense%20Evasion/subtechniques/Ptrace%20System%20Calls/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Defense%20Evasion/subtechniques/Reflective%20Code%20Loading/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Defense%20Evasion/subtechniques/Shared%20Library/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Defense%20Evasion/subtechniques/Thread%20Execution/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/Exploitation%20for%20Privilege%20Escalation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/subtechniques/CPU%20and%20GPU%20exploitation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/subtechniques/Capabilities%20Abuse/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/subtechniques/Kernel%20Exploitation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/subtechniques/SUID%20and%20GUID%20Abuse/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/subtechniques/Symlink%20Attack/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Exploitation%20for%20Privilege%20Escalation/subtechniques/TOCTOU/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Implant%20Internal%20Image/Implant%20Internal%20Image/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Masquerading/Masquerading/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Masquerading/subtechniques/Break%20Process%20Trees/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Masquerading/subtechniques/Match%20Legitimate%20Name%20or%20Location/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Scheduled%20Task/Scheduled%20Task/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Scheduled%20Task/subtechniques/At/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Scheduled%20Task/subtechniques/Container/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Scheduled%20Task/subtechniques/Cron/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Scheduled%20Task/subtechniques/Orchestration%20Job/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Scheduled%20Task/subtechniques/Systemd%20Timers/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Server%20Software%20Component/Server%20Software%20Component/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Server%20Software%20Component/subtechniques/SQL%20Stored%20Procedures/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Deepening%20Control/Server%20Software%20Component/subtechniques/Web%20Shell/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Cloud%20Service%20Discovery/Cloud%20Service%20Discovery/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Cloud%20Service%20Discovery/subtechniques/API-based%20Resource%20Listing/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Cloud%20Service%20Discovery/subtechniques/Open-source%20discovery%20tools/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Exploitation%20for%20Credential%20Access/Exploitation%20for%20Credential%20Access/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Exploitation%20for%20Credential%20Access/subtechniques/Memory%20Exploitation%20for%20Credential%20Extraction/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Exploitation%20for%20Credential%20Access/subtechniques/Stealing%20Tokens/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Exploitation%20of%20Remote%20Services/Exploitation%20of%20Remote%20Services/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Exploitation%20of%20Remote%20Services/subtechniques/API%20Misconfiguration%20Exploitation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Internal%20Data%20Harvesting/Internal%20Data%20Harvesting/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Service-to-Service%20Trust%20Abuse/Service-to-Service%20Trust%20Abuse/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Service-to-Service%20Trust%20Abuse/subtechniques/Overprivileged%20Service%20Account%20Exploitation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Expanding%20Control/Service-to-Service%20Trust%20Abuse/subtechniques/Token%20Replay%20or%20Reuse%20Attacks/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Authentication%20Bypass/Authentication%20Bypass/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Authentication%20Bypass/subtechniques/OAuth%20Flow%20Manipulation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Authentication%20Bypass/subtechniques/Password%20Brute%20Forcing/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Authentication%20Bypass/subtechniques/Race%20Condition%20Exploitation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Authentication%20Bypass/subtechniques/SQL%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Content%20Injection/Content%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Content%20Injection/subtechniques/Man-in-the-Middle%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Content%20Injection/subtechniques/Man-on-the-Side%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Content%20Injection/subtechniques/Protocol%20Exploitation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/External%20Remote%20Services/External%20Remote%20Services/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/External%20Remote%20Services/subtechniques/Exposed%20Gateway/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/External%20Remote%20Services/subtechniques/Exposed%20Kubernetes%20API/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/External%20Remote%20Services/subtechniques/SSH%20Access/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/External%20Remote%20Services/subtechniques/Unauthenticated%20Administration%20Interfaces/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Service%20Standard%20API/Service%20Standard%20API/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Supply%20Chain%20Compromise/Supply%20Chain%20Compromise/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Supply%20Chain%20Compromise/subtechniques/Build%20Environment%20Poisoning/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Supply%20Chain%20Compromise/subtechniques/Compromise%20Software%20Dependencies%20and%20Development%20Tools/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Supply%20Chain%20Compromise/subtechniques/Compromise%20Software%20Supply%20Chain/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Supply%20Chain%20Compromise/subtechniques/Container%20Registry%20Poisoning/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Supply%20Chain%20Compromise/subtechniques/Dependency%20Hijacking/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Supply%20Chain%20Compromise/subtechniques/Model%20Supply%20Chain%20Compromise/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Supply%20Chain%20Compromise/subtechniques/Software%20Update%20Manipulation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Valid%20Accounts/Valid%20Accounts/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Valid%20Accounts/subtechniques/Cloud%20Accounts/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Valid%20Accounts/subtechniques/Default%20Accounts/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Gain%20Access/Valid%20Accounts/subtechniques/Valid%20Tokens/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Business%20Logic%20Manipulation/Business%20Logic%20Manipulation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Data%20Destruction/Data%20Destruction/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Data%20Destruction/subtechniques/Backup%20Destruction%20or%20Tampering/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Data%20Destruction/subtechniques/Data%20Corruption%20via%20Overwriting/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Data%20Destruction/subtechniques/File%20or%20Database%20Record%20Deletion/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Data%20Destruction/subtechniques/Lifecycle-Triggered%20Deletion/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Data%20Encryption/Data%20Encryption/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Data%20Exfiltration/Data%20Exfiltration/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Data%20Manipulation/Data%20Manipulation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Data%20Manipulation/subtechniques/Runtime%20Data%20Manipulation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Data%20Manipulation/subtechniques/Transmitted%20Data%20Manipulation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Defacement/Defacement/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Defacement/subtechniques/Replacement/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Defacement/subtechniques/Website%20Content/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Financial%20Theft/Financial%20Theft/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Resource%20Hijacking/Resource%20Hijacking/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Resource%20Hijacking/subtechniques/Bandwidth%20Hijacking/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Resource%20Hijacking/subtechniques/Compute%20Hijacking/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Resource%20Hijacking/subtechniques/Cryptomining/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Service%20Disruption/Service%20Disruption/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Service%20Disruption/subtechniques/Denial%20of%20Service%20%28DoS%29%20Attacks/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Service%20Disruption/subtechniques/Resource%20Starvation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Service%20Disruption/subtechniques/System%20Shutdown%20and%20Reboot/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Impact/Service%20Disruption/subtechniques/Traffic%20Flooding/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/AI%20Infrastructure%20Exploitation/AI%20Infrastructure%20Exploitation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Execution%20Using%20Standard%20Applicative%20Flow/Execution%20Using%20Standard%20Applicative%20Flow/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/Injection%20Exploitations/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/Arbitrary%20File%20Write%20Exploitation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/CRLF%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/Expression%20Language%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/LDAP%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/NoSQL%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/OGNL%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/OS%20command%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/SQL%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/Template%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/XML%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Injection%20Exploitations/subtechniques/XXE%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Remote%20Code%20Execution%20Exploitation/Remote%20Code%20Execution%20Exploitation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Remote%20Code%20Execution%20Exploitation/subtechniques/Dynamic%20Code%20Evaluation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Remote%20Code%20Execution%20Exploitation/subtechniques/Insecure%20Deserialization%20Exploitation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Remote%20Code%20Execution%20Exploitation/subtechniques/Memory%20Buffer%20Overflow/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Remote%20Code%20Execution%20Exploitation/subtechniques/Memory%20Pointer%20Manipulation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Request%20Forgery/Request%20Forgery/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Request%20Forgery/subtechniques/CSRF/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Request%20Forgery/subtechniques/JNDI%20Injection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Request%20Forgery/subtechniques/SSRF/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Payload%20Execution/Request%20Forgery/subtechniques/Serialized%20Data%20External%20Linking/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20API%20Specification%20Harvesting/Application%20API%20Specification%20Harvesting/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20API%20Specification%20Harvesting/subtechniques/API%20Documentation%20Analysis/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20API%20Specification%20Harvesting/subtechniques/Fuzzing%20API%20Endpoints/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20API%20Specification%20Harvesting/subtechniques/Schema%20Extraction/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20API%20Specification%20Harvesting/subtechniques/Traffic%20Sniffing/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20Dependencies%20Mapping/Application%20Dependencies%20Mapping/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20Dependencies%20Mapping/subtechniques/Client-Side%20Commercial%20Vendor%20Discovery/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20Dependencies%20Mapping/subtechniques/Image%20Metadata%20Inspection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20Dependencies%20Mapping/subtechniques/Manifest%20Inspection/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20Dependencies%20Mapping/subtechniques/OpenSource%20Dependency%20Enumeration/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20Dependencies%20Mapping/subtechniques/Package%20Manifest%20Scraping/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20Dependencies%20Mapping/subtechniques/Registry%20Metadata%20Query/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Application%20Dependencies%20Mapping/subtechniques/SBOM%20Analysis/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Gather%20Application%20Configuration%20Information/Gather%20Application%20Configuration%20Information/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Gather%20Application%20Configuration%20Information/subtechniques/Feature%20Flag%20Discovery/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Gather%20Application%20Configuration%20Information/subtechniques/Fingerprinting/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Public%20Source%20Code%20and%20Artifacts%20Analysis/Public%20Source%20Code%20and%20Artifacts%20Analysis/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Public%20Source%20Code%20and%20Artifacts%20Analysis/subtechniques/Public%20Repository%20Discovery/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Public%20Source%20Code%20and%20Artifacts%20Analysis/subtechniques/Static%20Code%20Analysis/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Reverse%20Engineering/Reverse%20Engineering/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Reverse%20Engineering/subtechniques/Binary%20Disassembly/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Reconnaissance/Reverse%20Engineering/subtechniques/Protocol%20Analysis/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Compromised%20Code%20Signing%20and%20Build%20Infrastructure/Compromised%20Code%20Signing%20and%20Build%20Infrastructure/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Compromised%20Code%20Signing%20and%20Build%20Infrastructure/subtechniques/Build%20Pipeline%20Manipulation/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Compromised%20Code%20Signing%20and%20Build%20Infrastructure/subtechniques/Build%20Script%20Tampering/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Develop%20Capabilities/Develop%20Capabilities/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Develop%20Capabilities/subtechniques/Exploits/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Develop%20Capabilities/subtechniques/Malware/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Obtain%20Capabilities/Obtain%20Capabilities/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Obtain%20Capabilities/subtechniques/Acquisition%20of%20Stolen%20Keys%20%26%20Credentials/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Obtain%20Capabilities/subtechniques/Exploits/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Obtain%20Capabilities/subtechniques/Malware/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Obtain%20Capabilities/subtechniques/Tool/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Obtain%20Capabilities/subtechniques/Vulnerabilities/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Third-Party%20Dependency%20Poisoning/Third-Party%20Dependency%20Poisoning/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Third-Party%20Dependency%20Poisoning/subtechniques/Backdoored%20Open-Source%20Libraries/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Third-Party%20Dependency%20Poisoning/subtechniques/Dependency%20Confusion/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
    <url>
         <loc>https://functions.dev.oligo.security/techniques/Resource%20Development/Third-Party%20Dependency%20Poisoning/subtechniques/Typosquatting%20Dependencies/</loc>
         <lastmod>2025-12-12</lastmod>
    </url>
</urlset>