<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://hunterground.lat</loc>
    <lastmod>2026-02-06T10:24:04.481Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/web-basic-cookie-thief-jto</loc>
    <lastmod>2025-04-29T19:34:04.004235+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Web Basic: Cookie Thief</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Learn the fundamentals of cookie-based authentication and how to exploit common vulnerabilities.</image:caption>
    </image:image>
    <video:video>
      <video:title>Web Basic: Cookie Thief</video:title>
      <video:description>Learn the fundamentals of cookie-based authentication and how to exploit common vulnerabilities.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/crypto-challenge-rsa-basics-o5f</loc>
    <lastmod>2025-04-24T19:34:03.988112+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Crypto Challenge: RSA Basics</news:title>
      <news:keywords>CTF,cybersecurity,crypto</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Understanding and breaking basic RSA encryption implementations.</image:caption>
    </image:image>
    <video:video>
      <video:title>Crypto Challenge: RSA Basics</video:title>
      <video:description>Understanding and breaking basic RSA encryption implementations.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/forensics-network-packet-analysis-7br</loc>
    <lastmod>2025-04-26T19:34:03.988113+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Forensics: Network Packet Analysis</news:title>
      <news:keywords>CTF,cybersecurity,forensics</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Analyze network traffic to discover hidden communications and extract sensitive data.</image:caption>
    </image:image>
    <video:video>
      <video:title>Forensics: Network Packet Analysis</video:title>
      <video:description>Analyze network traffic to discover hidden communications and extract sensitive data.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/pwn-basic-buffer-overflow-9zb</loc>
    <lastmod>2025-04-29T19:44:41.976849+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Pwn: Basic Buffer Overflow</news:title>
      <news:keywords>CTF,cybersecurity,pwn</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Learn to exploit basic buffer overflow vulnerabilities in C programs.</image:caption>
    </image:image>
    <video:video>
      <video:title>Pwn: Basic Buffer Overflow</video:title>
      <video:description>Learn to exploit basic buffer overflow vulnerabilities in C programs.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/reverse-engineering-android-apk-mch</loc>
    <lastmod>2025-05-04T19:28:46.010677+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Reverse Engineering: Android APK</news:title>
      <news:keywords>CTF,cybersecurity,reverse</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Reverse engineer an Android application to discover hidden functionality and extract credentials.</image:caption>
    </image:image>
    <video:video>
      <video:title>Reverse Engineering: Android APK</video:title>
      <video:description>Reverse engineer an Android application to discover hidden functionality and extract credentials.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/osint-company-secrets-b44</loc>
    <lastmod>2025-04-28T13:34:03.988118+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>OSINT: Company Secrets</news:title>
      <news:keywords>CTF,cybersecurity,osint</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Use open-source intelligence techniques to gather information about a fictional company.</image:caption>
    </image:image>
    <video:video>
      <video:title>OSINT: Company Secrets</video:title>
      <video:description>Use open-source intelligence techniques to gather information about a fictional company.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/blockchain-smart-contract-vulnerabilities-f4v</loc>
    <lastmod>2025-04-28T23:34:03.988119+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Blockchain: Smart Contract Vulnerabilities</news:title>
      <news:keywords>CTF,cybersecurity,blockchain</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Identify and exploit vulnerabilities in Ethereum smart contracts.</image:caption>
    </image:image>
    <video:video>
      <video:title>Blockchain: Smart Contract Vulnerabilities</video:title>
      <video:description>Identify and exploit vulnerabilities in Ethereum smart contracts.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/mobile-ios-api-hooking-qs6</loc>
    <lastmod>2025-04-29T04:34:03.98812+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Mobile: iOS API Hooking</news:title>
      <news:keywords>CTF,cybersecurity,mobile</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Learn how to hook into an iOS application&apos;s API calls and manipulate its behavior.</image:caption>
    </image:image>
    <video:video>
      <video:title>Mobile: iOS API Hooking</video:title>
      <video:description>Learn how to hook into an iOS application&apos;s API calls and manipulate its behavior.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/misc-steganography-basics-28e</loc>
    <lastmod>2025-04-29T09:34:03.988122+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Misc: Steganography Basics</news:title>
      <news:keywords>CTF,cybersecurity,misc</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Discover hidden data in images, audio, and other file formats using steganography techniques.</image:caption>
    </image:image>
    <video:video>
      <video:title>Misc: Steganography Basics</video:title>
      <video:description>Discover hidden data in images, audio, and other file formats using steganography techniques.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/hardware-rfid-exploitation-yd8</loc>
    <lastmod>2025-04-29T14:34:03.988123+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Hardware: RFID Exploitation</news:title>
      <news:keywords>CTF,cybersecurity,hardware</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Learn how to exploit vulnerabilities in RFID-based access control systems.</image:caption>
    </image:image>
    <video:video>
      <video:title>Hardware: RFID Exploitation</video:title>
      <video:description>Learn how to exploit vulnerabilities in RFID-based access control systems.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/webpolyglot-jsi</loc>
    <lastmod>2025-05-02T12:47:59.588357+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>webpolyglot</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>test</image:caption>
    </image:image>
    <video:video>
      <video:title>webpolyglot</video:title>
      <video:description>test</video:description>
      <video:tag>CSAW</video:tag>
      <video:tag>CSAW</video:tag>
      <video:tag>Year: 2024</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/2app-1cv</loc>
    <lastmod>2025-05-01T13:35:11.667405+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>2app</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>2app</image:caption>
    </image:image>
    <video:video>
      <video:title>2app</video:title>
      <video:description>2app</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/webpp-gvs</loc>
    <lastmod>2025-05-01T14:17:07.078575+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>webpp</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>webpp</image:caption>
    </image:image>
    <video:video>
      <video:title>webpp</video:title>
      <video:description>webpp</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/tes-2633</loc>
    <lastmod>2025-05-08T02:55:53.668233+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>tes</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>testtestetstets</image:caption>
    </image:image>
    <video:video>
      <video:title>tes</video:title>
      <video:description>testtestetstets</video:description>
      <video:tag>HunterGround</video:tag>
      <video:tag>HunterGround CTF</video:tag>
      <video:tag>Year: 2025</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/chall-submission-bdddcfea</loc>
    <lastmod>2025-05-14T19:47:32.647915+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>chall submission</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>chall submission</image:caption>
    </image:image>
    <video:video>
      <video:title>chall submission</video:title>
      <video:description>chall submission</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/ada-indonesia-coy-e2ef7db0</loc>
    <lastmod>2025-05-15T00:50:20.271196+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>ada indonesia coy</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>HTR{test}</image:caption>
    </image:image>
    <video:video>
      <video:title>ada indonesia coy</video:title>
      <video:description>HTR{test}</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/htrtesthtrtesthtrtest-cc13c635</loc>
    <lastmod>2025-05-16T17:51:30.5966+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>HTR{test}HTR{test}HTR{test}</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>HTR{test}HTR{test}HTR{test}HTR{test}</image:caption>
    </image:image>
    <video:video>
      <video:title>HTR{test}HTR{test}HTR{test}</video:title>
      <video:description>HTR{test}HTR{test}HTR{test}HTR{test}</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/ghazy-corp-4cd68757</loc>
    <lastmod>2025-05-18T18:53:21.048159+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Ghazy Corp</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Ghazy Corp</image:caption>
    </image:image>
    <video:video>
      <video:title>Ghazy Corp</video:title>
      <video:description>Ghazy Corp</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/amazing-cryptoaamazing-cryptoa-6e27f03f</loc>
    <lastmod>2025-05-20T19:28:01.10544+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Amazing CryptoaAmazing Cryptoa</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Amazing Cryptoa</image:caption>
    </image:image>
    <video:video>
      <video:title>Amazing CryptoaAmazing Cryptoa</video:title>
      <video:description>Amazing Cryptoa</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/web-basic-cookie-thief-1de69895</loc>
    <lastmod>2025-10-10T00:08:38.37292+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Web Basic: Cookie Thief</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Learn the fundamentals of cookie-based authentication and how to exploit common vulnerabilities.</image:caption>
    </image:image>
    <video:video>
      <video:title>Web Basic: Cookie Thief</video:title>
      <video:description>Learn the fundamentals of cookie-based authentication and how to exploit common vulnerabilities.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/crypto-challenge-rsa-basics-02fe3e2d</loc>
    <lastmod>2025-10-05T00:08:38.229469+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Crypto Challenge: RSA Basics</news:title>
      <news:keywords>CTF,cybersecurity,crypto</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Understanding and breaking basic RSA encryption implementations.</image:caption>
    </image:image>
    <video:video>
      <video:title>Crypto Challenge: RSA Basics</video:title>
      <video:description>Understanding and breaking basic RSA encryption implementations.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/forensics-network-packet-analysis-56d04d32</loc>
    <lastmod>2025-10-07T00:08:38.229473+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Forensics: Network Packet Analysis</news:title>
      <news:keywords>CTF,cybersecurity,forensics</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Analyze network traffic to discover hidden communications and extract sensitive data.</image:caption>
    </image:image>
    <video:video>
      <video:title>Forensics: Network Packet Analysis</video:title>
      <video:description>Analyze network traffic to discover hidden communications and extract sensitive data.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/pwn-basic-buffer-overflow-d407a664</loc>
    <lastmod>2025-10-08T00:08:38.229476+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Pwn: Basic Buffer Overflow</news:title>
      <news:keywords>CTF,cybersecurity,pwn</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Learn to exploit basic buffer overflow vulnerabilities in C programs.</image:caption>
    </image:image>
    <video:video>
      <video:title>Pwn: Basic Buffer Overflow</video:title>
      <video:description>Learn to exploit basic buffer overflow vulnerabilities in C programs.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/reverse-engineering-android-apk-1a33542c</loc>
    <lastmod>2025-10-09T00:08:38.229478+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Reverse Engineering: Android APK</news:title>
      <news:keywords>CTF,cybersecurity,reverse</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Reverse engineer an Android application to discover hidden functionality and extract credentials.</image:caption>
    </image:image>
    <video:video>
      <video:title>Reverse Engineering: Android APK</video:title>
      <video:description>Reverse engineer an Android application to discover hidden functionality and extract credentials.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/osint-company-secrets-f9073dac</loc>
    <lastmod>2025-10-08T18:08:38.229481+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>OSINT: Company Secrets</news:title>
      <news:keywords>CTF,cybersecurity,osint</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Use open-source intelligence techniques to gather information about a fictional company.</image:caption>
    </image:image>
    <video:video>
      <video:title>OSINT: Company Secrets</video:title>
      <video:description>Use open-source intelligence techniques to gather information about a fictional company.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/blockchain-smart-contract-vulnerabilities-77e9f5f6</loc>
    <lastmod>2025-10-09T04:08:38.229484+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Blockchain: Smart Contract Vulnerabilities</news:title>
      <news:keywords>CTF,cybersecurity,blockchain</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Identify and exploit vulnerabilities in Ethereum smart contracts.</image:caption>
    </image:image>
    <video:video>
      <video:title>Blockchain: Smart Contract Vulnerabilities</video:title>
      <video:description>Identify and exploit vulnerabilities in Ethereum smart contracts.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/mobile-ios-api-hooking-e905e5ee</loc>
    <lastmod>2025-10-09T09:08:38.229486+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Mobile: iOS API Hooking</news:title>
      <news:keywords>CTF,cybersecurity,mobile</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Learn how to hook into an iOS application&apos;s API calls and manipulate its behavior.</image:caption>
    </image:image>
    <video:video>
      <video:title>Mobile: iOS API Hooking</video:title>
      <video:description>Learn how to hook into an iOS application&apos;s API calls and manipulate its behavior.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/misc-steganography-basics-7dd63a92</loc>
    <lastmod>2025-10-09T14:08:38.229489+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Misc: Steganography Basics</news:title>
      <news:keywords>CTF,cybersecurity,misc</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Discover hidden data in images, audio, and other file formats using steganography techniques.</image:caption>
    </image:image>
    <video:video>
      <video:title>Misc: Steganography Basics</video:title>
      <video:description>Discover hidden data in images, audio, and other file formats using steganography techniques.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/hardware-rfid-exploitation-05d7b7eb</loc>
    <lastmod>2025-10-09T19:08:38.229492+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>Hardware: RFID Exploitation</news:title>
      <news:keywords>CTF,cybersecurity,hardware</news:keywords>
    </news:news>
    <image:image>
      <image:caption>Learn how to exploit vulnerabilities in RFID-based access control systems.</image:caption>
    </image:image>
    <video:video>
      <video:title>Hardware: RFID Exploitation</video:title>
      <video:description>Learn how to exploit vulnerabilities in RFID-based access control systems.</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/working-challenge-test-183a7d3a</loc>
    <lastmod>2025-10-10T02:31:49.643353+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>working challenge test</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>working challenge test</image:caption>
    </image:image>
    <video:video>
      <video:title>working challenge test</video:title>
      <video:description>working challenge test</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/shouldbe-working-f17afa06</loc>
    <lastmod>2025-10-10T02:35:15.536629+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>shouldbe working</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>shouldbe working</image:caption>
    </image:image>
    <video:video>
      <video:title>shouldbe working</video:title>
      <video:description>shouldbe working</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/bisalahbisalahbisalah-8b4f3a0d</loc>
    <lastmod>2025-10-10T03:28:45.660568+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>bisalahbisalahbisalah</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>bisalahbisalahbisalah</image:caption>
    </image:image>
    <video:video>
      <video:title>bisalahbisalahbisalah</video:title>
      <video:description>bisalahbisalahbisalah</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/secureweb-1f67dcb1</loc>
    <lastmod>2025-10-10T03:34:47.211716+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>secureweb</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>secureweb</image:caption>
    </image:image>
    <video:video>
      <video:title>secureweb</video:title>
      <video:description>secureweb</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
  <url>
    <loc>https://hunterground.lat/public/challenge/its-working-now-ead74cad</loc>
    <lastmod>2025-10-10T03:40:44.758945+08:00</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.8</priority>
    <news:news>
      <news:publication>
        <news:name>HunterGround</news:name>
        <news:language>en</news:language>
      </news:publication>
      <news:title>its working now</news:title>
      <news:keywords>CTF,cybersecurity,web</news:keywords>
    </news:news>
    <image:image>
      <image:caption>its working now</image:caption>
    </image:image>
    <video:video>
      <video:title>its working now</video:title>
      <video:description>its working now</video:description>
      <video:tag></video:tag>
      <video:tag></video:tag>
      <video:tag>Year: 2026</video:tag>
    </video:video>
  </url>
</urlset>