<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.cyberdiary.net/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.cyberdiary.net/feed.php">
        <title>Cybersecurity</title>
        <description></description>
        <link>https://wiki.cyberdiary.net/</link>
        <image rdf:resource="https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-05-14T09:43:24+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=all_articles&amp;rev=1778749205&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.cyberdiary.net/doku.php?id=start&amp;rev=1778751200&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>Cybersecurity</title>
        <link>https://wiki.cyberdiary.net/</link>
        <url>https://wiki.cyberdiary.net/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=all_articles&amp;rev=1778749205&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:00:05+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>all_articles</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=all_articles&amp;rev=1778749205&amp;do=diff</link>
        <description>All Articles

Complete index of every page on this wiki.

The Bug Hunter's Methodology (TBHM)

	*  01 - Philosophy &amp; Mindset
	*  02 - Discovery &amp; Recon
	*  03 - Mapping the Attack Surface
	*  04 - Authorization &amp; Session
	*  05 - Cross-Site Scripting (XSS)
	*  06 - SQL Injection
	*  07 - File Upload
	*  08 - CSRF
	*  09 - Privilege, Logic &amp; Transport
	*  10 - Mobile Testing
	*  11 - Auxiliary Info &amp; Tools
	*  12 - IDOR
	*  Fast Testing Checklist
	*  TBHM Index
	*  Test Page
	*  TBHM v4

Zseano's…</description>
    </item>
    <item rdf:about="https://wiki.cyberdiary.net/doku.php?id=start&amp;rev=1778751200&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2026-05-14T09:33:20+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>start</title>
        <link>https://wiki.cyberdiary.net/doku.php?id=start&amp;rev=1778751200&amp;do=diff</link>
        <description>Wiki

Welcome to the knowledge base.

TBHM Chapters

	*  01 - Philosophy &amp; Mindset
	*  02 - Discovery &amp; Recon
	*  03 - Mapping the Attack Surface
	*  04 - Authorization &amp; Session Management
	*  05 - Cross-Site Scripting (XSS)
	*  06 - SQL Injection
	*  07 - File Upload Vulnerabilities
	*  08 - CSRF
	*  09 - Privilege Escalation, Logic &amp; Transport
	*  10 - Mobile Testing
	*  11 - Auxiliary Info &amp; Tools
	*  12 - IDOR
	*  Fast Testing Checklist

Quick Reference

	*  TBHM Index
	*  Fast Checklist
	*…</description>
    </item>
</rdf:RDF>
