<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://hiddeninvestigations.net/blog/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
<url>
<loc>https://hiddeninvestigations.net/blog/</loc>
</url>
<url>
<loc>https://hiddeninvestigations.net/blog/ai-agents-autonomous-hacking-zero-day-bugs.html</loc>
<lastmod>2026-03-15T21:59:14+06:00</lastmod>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/9/Thumnail-Can-AI-Agents-Autonomously-Hack-Websites-Find-Vulnerabilities-and-Exploit-Zero-Day-Bugs.png</image:loc>
<image:title><![CDATA[Can AI Agents Autonomously Hack Websites, Find Vulnerabilities, and Exploit Zero-Day Bugs?]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/9/image-1.1-Can-AI-Agents-Now-Autonomously-Hack-Websites-Find-Bugs-and-Exploit-Zero-Day-Vulnerabilities-Without-Human-Help.png</image:loc>
<image:title><![CDATA[Can AI Agents Autonomously Hack Websites, Find Vulnerabilities, and Exploit Zero-Day Bugs]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/9/chart-1.1-Can-AI-Agents-Now-Autonomously-Hack-Websites-Find-Bugs-and-Exploit-Zero-Day-Vulnerabilities-Without-Human-Help-2.png</image:loc>
<image:title><![CDATA[Can AI Agents Autonomously Hack Websites, Find Vulnerabilities, and Exploit Zero-Day Bugs?]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/9/image-2-Can-AI-Agents-Now-Autonomously-Hack-Websites-Find-Bugs-and-Exploit-Zero-Day-Vulnerabilities-Without-Human-Help.png</image:loc>
<image:title><![CDATA[Can AI Agents Now Autonomously Hack Websites, Find Bugs, and Exploit Zero-Day Vulnerabilities Without Human Help]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/9/image-5-Can-AI-Agents-Now-Autonomously-Hack-Websites-Find-Bugs-and-Exploit-Zero-Day-Vulnerabilities-Without-Human-Help.png</image:loc>
<image:title><![CDATA[Can AI Agents Autonomously Hack Websites, Find Vulnerabilities, and Exploit Zero-Day Bugs]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/9/chart-2.1-Can-AI-Agents-Now-Autonomously-Hack-Websites-Find-Bugs-and-Exploit-Zero-Day-Vulnerabilities-Without-Human-Help.png</image:loc>
<image:title><![CDATA[Can AI Agents Autonomously Hack Websites, Find Vulnerabilities, and Exploit Zero-Day Bugs?]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/9/image-3-Can-AI-Agents-Now-Autonomously-Hack-Websites-Find-Bugs-and-Exploit-Zero-Day-Vulnerabilities-Without-Human-Help.png</image:loc>
<image:title><![CDATA[Can AI Agents Now Autonomously Hack Websites, Find Bugs, and Exploit Zero-Day Vulnerabilities Without Human Help]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/9/image-4.1-Can-AI-Agents-Now-Autonomously-Hack-Websites-Find-Bugs-and-Exploit-Zero-Day-Vulnerabilities-Without-Human-Help.png</image:loc>
<image:title><![CDATA[Can AI Agents Autonomously Hack Websites, Find Vulnerabilities, and Exploit Zero-Day Bugs]]></image:title>
</image:image>
</url>
<url>
<loc>https://hiddeninvestigations.net/blog/django-cve-2025-64459-critical-sql-injection-in-the-orm-explained.html</loc>
<lastmod>2026-03-12T13:23:03+06:00</lastmod>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/5/Django-CVE-2025-64459-Critical-SQL-Injection-in-the-ORM-Explained-or-Hidden-Investigations-2-2xl.webp</image:loc>
<image:title><![CDATA[Django CVE-2025-64459: Critical SQL Injection in the ORM Explained]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/5/Django-CVE-2025-64459-THM1.png</image:loc>
<image:title><![CDATA[Django CVE-2025-64459: Critical SQL Injection in the ORM Explained]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/5/Django-CVE-2025-64459-THM2.png</image:loc>
<image:title><![CDATA[Django CVE-2025-64459: Critical SQL Injection in the ORM Explained]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/5/Django-CVE-2025-64459-THM3.png</image:loc>
<image:title><![CDATA[Django CVE-2025-64459: Critical SQL Injection in the ORM Explained]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/5/Django-CVE-2025-64459-THM4.png</image:loc>
<image:title><![CDATA[Django CVE-2025-64459: Critical SQL Injection in the ORM Explained]]></image:title>
</image:image>
</url>
<url>
<loc>https://hiddeninvestigations.net/blog/docker-zero-to-hero-for-hackers-a-practical-guide-for-cybersecurity-enthusiasts.html</loc>
<lastmod>2026-03-12T03:31:40+06:00</lastmod>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/1/Docker-Zero-to-Hero-For-Hackers-A-Practical-Guide-for-Cybersecurity-Enthusiasts-2xl.webp</image:loc>
<image:title><![CDATA[Docker Zero to Hero For Hackers: A Practical Guide for Cybersecurity Enthusiasts]]></image:title>
</image:image>
</url>
<url>
<loc>https://hiddeninvestigations.net/blog/file-upload-bypass-understanding-and-mitigating-risks-in-web-applications.html</loc>
<lastmod>2026-03-12T13:24:12+06:00</lastmod>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/4/File-Upload-Bypass-Understanding-and-Mitigating-Risks-in-Web-Applications-2xl.webp</image:loc>
<image:title><![CDATA[File Upload Bypass: Understanding and Mitigating Risks in Web Applications]]></image:title>
</image:image>
</url>
<url>
<loc>https://hiddeninvestigations.net/blog/how-to-find-hidden-messages-in-jpegs-a-beginners-guide-to-ctf-steganography-challenges-from-kuets-cyber-security-seminar.html</loc>
<lastmod>2026-03-12T03:31:19+06:00</lastmod>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/3/How-to-Find-Hidden-Messages-in-JPEGs-A-Beginners-Guide-to-CTF-Steganography-Challenges-from-KUETs-Cyber-Security-Seminar-2xl.webp</image:loc>
<image:title><![CDATA[How to Find Hidden Messages in JPEGs: A Beginner’s Guide to CTF Steganography Challenges from KUET’s Cyber Security Seminar]]></image:title>
</image:image>
</url>
<url>
<loc>https://hiddeninvestigations.net/blog/mongobleed-cve-2025-14847-when-mongodb-compression-leaks-memory.html</loc>
<lastmod>2026-03-12T13:22:25+06:00</lastmod>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/7/MongoBleed-CVE-2025-14847-When-MongoDB-Compression-Leaks-Memory.webp</image:loc>
<image:title><![CDATA[MongoBleed (CVE-2025-14847): When MongoDB Compression Leaks Memory]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/7/Timeline-graphic-disclosure-exploitation.png</image:loc>
<image:title><![CDATA[MongoBleed (CVE-2025-14847): When MongoDB Compression Leaks Memory]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/7/Flow-diagram_-attack-path-vs-normal-path.png</image:loc>
<image:title><![CDATA[MongoBleed (CVE-2025-14847): When MongoDB Compression Leaks Memory]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/7/Memory-buffer-illustration.png</image:loc>
<image:title><![CDATA[MongoBleed (CVE-2025-14847): When MongoDB Compression Leaks Memory]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/7/Detection-dashboard-mock.png</image:loc>
<image:title><![CDATA[MongoBleed (CVE-2025-14847): When MongoDB Compression Leaks Memory]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/7/Remediation-checklist-poster.png</image:loc>
<image:title><![CDATA[MongoBleed (CVE-2025-14847): When MongoDB Compression Leaks Memory]]></image:title>
</image:image>
</url>
<url>
<loc>https://hiddeninvestigations.net/blog/page/2/</loc>
</url>
<url>
<loc>https://hiddeninvestigations.net/blog/remote-code-execution-in-ghost-cms-cve-2026-29053-when-a-theme-becomes-a-server-side-execution-primitive.html</loc>
<lastmod>2026-03-12T14:39:04+06:00</lastmod>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/8/Remote-Code-Execution-in-Ghost-CMS-CVE-2026-29053-When-a-Theme-Becomes-a-Server-Side-Execution-Primitive-ghost_rce_thumbnail.png</image:loc>
<image:title><![CDATA[Remote Code Execution in Ghost CMS (CVE-2026-29053): When a Theme Becomes a Server-Side Execution Primitive - Hidden Investigations]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/8/Remote-Code-Execution-in-Ghost-CMS-CVE-2026-29053-When-a-Theme-Becomes-a-Server-Side-Execution-Primitive-2.png</image:loc>
<image:title><![CDATA[Remote Code Execution in Ghost CMS (CVE-2026-29053): When a Theme Becomes a Server-Side Execution Primitive]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/8/Remote-Code-Execution-in-Ghost-CMS-CVE-2026-29053-When-a-Theme-Becomes-a-Server-Side-Execution-Primitive-ghost_cve_exploit_chain.png</image:loc>
<image:title><![CDATA[Remote Code Execution in Ghost CMS (CVE-2026-29053): When a Theme Becomes a Server-Side Execution Primitive - Ghost CMS CVE chain]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/8/Remote-Code-Execution-in-Ghost-CMS-CVE-2026-29053-When-a-Theme-Becomes-a-Server-Side-Execution-Primitive-ghost_before_after_patch.png</image:loc>
<image:title><![CDATA[Remote Code Execution in Ghost CMS (CVE-2026-29053): When a Theme Becomes a Server-Side Execution Primitive]]></image:title>
</image:image>
</url>
<url>
<loc>https://hiddeninvestigations.net/blog/shai-hulud-v2-second-coming-inside-the-npm-supply-chain-worm.html</loc>
<lastmod>2026-03-12T13:22:40+06:00</lastmod>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/6/Shai-Hulud-v2-Second-Coming-Inside-the-npm-Supply-Chain-Worm-2-2xl.webp</image:loc>
<image:title><![CDATA[Shai-Hulud v2 “Second Coming”: Inside the npm Supply Chain Worm]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/6/Shai-Hulud-v2-Observed-Kill-Chain-2.png</image:loc>
<image:title><![CDATA[Shai-Hulud v2 “Second Coming”: Inside the npm Supply Chain Worm]]></image:title>
</image:image>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/6/sha1hulud-affected-github-repo-2.png</image:loc>
<image:title><![CDATA[Shai-Hulud v2 “Second Coming”: Inside the npm Supply Chain Worm]]></image:title>
</image:image>
</url>
<url>
<loc>https://hiddeninvestigations.net/blog/unearthing-secrets-in-memory-a-full-write-up-of-now-you-see-me-shakti-ctf-2025.html</loc>
<lastmod>2026-03-12T03:31:33+06:00</lastmod>
<image:image>
<image:loc>https://hiddeninvestigations.net/blog/media/posts/2/Unearthing-Secrets-in-Memory-A-Full-Write-Up-of-Now-You-See-Me-Shakti-CTF-2025-2xl.webp</image:loc>
<image:title><![CDATA[Unearthing Secrets in Memory — A Full Write-Up of “Now You See Me” (Shakti CTF 2025)]]></image:title>
</image:image>
</url>
</urlset>