<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://srlabs.de/</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/about</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/careers</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/blog</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/services</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/services/vulnerability-prioritization</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/services/telco-security</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/services/software-assurance</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/services/security-maturity-review</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/services/security-team-incubation</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/services/red-teaming</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/services/incident-response</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/services/device-testing</loc>
    <lastmod>2025-09-30T14:08:57+02:00</lastmod>
  </url>
  <url>
    <loc>https://srlabs.de/blog/cosmwasm</loc>
    <lastmod>2026-03-24T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/cosmwasm/cover-3024.7c6495f6e2.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/hacking-ai-agent</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/hacking-ai-agent/cover-3573.a90535c4b9.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/ai-verification-bottleneck</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/ai-verification-bottleneck/cover-2400.4d8470ced8.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/breaking-ilias-part-2-three-to-rce</loc>
    <lastmod>2026-01-23T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/breaking-ilias-part-2-three-to-rce/cover-2396.8f53d49ac3.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/competing-at-the-def-con-ctf-finals-2025</loc>
    <lastmod>2025-10-02T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/competing-at-the-def-con-ctf-finals-2025/cover-2592.dd3605eb8f.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/breaking-ilias-part-1-from-open-redirect-to-admin</loc>
    <lastmod>2025-09-24T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/breaking-ilias-part-1-from-open-redirect-to-admin/cover-2592.3f87669b63.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/unlocking-secrets-effective-fuzzing-harness</loc>
    <lastmod>2025-08-07T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/unlocking-secrets-effective-fuzzing-harness/harness-cover-1024.6c319e868a.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/hexagon-fuzz-full-system-emulated-fuzzing-of-qualcomm-basebands</loc>
    <lastmod>2025-06-27T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/hexagon-fuzz-full-system-emulated-fuzzing-of-qualcomm-basebands/hexagon-cover-800.d798c0086b.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/ethical-hackers-can-help-reduce-ss7-abuse</loc>
    <lastmod>2025-06-17T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/ethical-hackers-can-help-reduce-ss7-abuse/cover-ss7-1153.df02772bc9.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/enhancing-our-code-audits-with-ai</loc>
    <lastmod>2025-06-06T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/enhancing-our-code-audits-with-ai/cover-1536.241ded8a2f.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/xiaohongshu-little-red-book-reads-you</loc>
    <lastmod>2025-05-12T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/xiaohongshu-little-red-book-reads-you/cover-1536.0262276e2e.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/golibafl---fuzzing-go-binaries-using-libafl</loc>
    <lastmod>2025-04-16T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/golibafl---fuzzing-go-binaries-using-libafl/gopher-cover-1024.f8e25d2aac.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/fuzzing-made-easy-outline</loc>
    <lastmod>2025-01-31T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/fuzzing-made-easy-outline/fuzzing-cover-2047.a24c247048.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/guide-to-writing-fuzzing-harness</loc>
    <lastmod>2025-01-31T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/guide-to-writing-fuzzing-harness/cover-1750.7c3ef36883.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/bogusbazaar</loc>
    <lastmod>2024-08-05T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/bogusbazaar/cover-1441.bd454fc669.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/black-basta-buster-decrypting-files-without-paying-the-ransom</loc>
    <lastmod>2024-08-02T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/black-basta-buster-decrypting-files-without-paying-the-ransom/basta-cover-612.c9ad3b1d06.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/certiception-the-adcs-honeypot-we-always-wanted</loc>
    <lastmod>2024-07-07T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/certiception-the-adcs-honeypot-we-always-wanted/honeypot-980.d91ae10044.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/blue-merle</loc>
    <lastmod>2024-01-24T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/blue-merle/cover-1440.cf2dcdbae2.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/advanced-fuzzing-unmasks-elusive-vulnerabilities</loc>
    <lastmod>2023-10-16T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/advanced-fuzzing-unmasks-elusive-vulnerabilities/cover-1440.a3b89e7476.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/telco-security-retreat-2023</loc>
    <lastmod>2023-10-16T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/telco-security-retreat-2023/cover-1390.821b1de94d.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/edrs-decrease-your-enterprise-security-unless-properly-hardened</loc>
    <lastmod>2022-08-24T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/edrs-decrease-your-enterprise-security-unless-properly-hardened/cover-1440.242d3d11c5.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/pos-hack</loc>
    <lastmod>2022-08-16T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/pos-hack/cover-2880.c3f79a6a98.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/5g-security</loc>
    <lastmod>2022-08-08T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/5g-security/cover-2880.06e87915c3.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/java-patch-test</loc>
    <lastmod>2022-05-12T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/java-patch-test/cover-2880.71c3262b94.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/blockchain-application</loc>
    <lastmod>2022-03-22T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/blockchain-application/cover-2880.78d705dd41.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/flubot-abuses-accessibility-features-to-steal-data</loc>
    <lastmod>2021-12-21T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/flubot-abuses-accessibility-features-to-steal-data/cover-2880.35a9b70a13.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/chaining-three-zero-day-exploits-in-itsm-software-servicetonic-for-remote-code-execution</loc>
    <lastmod>2021-11-02T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/chaining-three-zero-day-exploits-in-itsm-software-servicetonic-for-remote-code-execution/cover-2880.c4e79dc456.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/blockchain-security-six-common-mistakes-found-in-substate-chains</loc>
    <lastmod>2021-10-12T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/blockchain-security-six-common-mistakes-found-in-substate-chains/cover-2880.22e539564a.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/blockchain-security-best-practices-for-your-next-review</loc>
    <lastmod>2021-09-27T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/blockchain-security-best-practices-for-your-next-review/cover-4166.0eef879bca.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/vulnerability-disclosure-best-practices</loc>
    <lastmod>2021-09-13T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/vulnerability-disclosure-best-practices/cover-784.117d1aba42.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/honeypot-research-shows-variety-of-ddos-amplification-methods</loc>
    <lastmod>2021-07-30T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/honeypot-research-shows-variety-of-ddos-amplification-methods/cover-784.1e1f0113e4.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/telerik-100-times-faster</loc>
    <lastmod>2021-06-22T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/telerik-100-times-faster/cover-784.6f820e8d46.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/zyxel-zero-day</loc>
    <lastmod>2021-05-12T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/zyxel-zero-day/cover-785.1307ab7396.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/decade-of-hacking</loc>
    <lastmod>2020-08-11T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/decade-of-hacking/cover-876.2497613b3e.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/android-patch-gap-2020</loc>
    <lastmod>2020-04-22T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/android-patch-gap-2020/cover-784.1c665c1061.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/rcs-hacking</loc>
    <lastmod>2019-11-29T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/rcs-hacking/cover-784.3ea3033b2f.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/smart-spies</loc>
    <lastmod>2019-10-20T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/smart-spies/cover-785.8e3e09a5de.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/new-sim-attacks</loc>
    <lastmod>2019-09-27T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/new-sim-attacks/cover-784.a07b983396.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/blockchain-patch-gap</loc>
    <lastmod>2019-05-17T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/blockchain-patch-gap/cover-784.5a6882c92e.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/ethereum-dos</loc>
    <lastmod>2019-05-17T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/ethereum-dos/cover-784.185cd5ca96.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/compliance-skew</loc>
    <lastmod>2018-11-30T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/compliance-skew/cover-784.c52f295ff2.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/hackability-score</loc>
    <lastmod>2018-11-29T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/hackability-score/cover-784.e7cfee1548.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/android-patch-gap</loc>
    <lastmod>2018-04-12T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/android-patch-gap/cover-784.5f654f71e3.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/cloud-cameras</loc>
    <lastmod>2017-11-16T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/cloud-cameras/cover-784.28f3fe496f.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/travel-hacking</loc>
    <lastmod>2016-12-26T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/travel-hacking/cover-784.7ff10c86fd.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/pos-vulns</loc>
    <lastmod>2015-12-22T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/pos-vulns/cover-784.4142af05a6.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/usb-peripherals-turn</loc>
    <lastmod>2014-07-31T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/usb-peripherals-turn/cover-784.de3cca4b5c.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/spoofing-fingerprints</loc>
    <lastmod>2013-09-25T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/spoofing-fingerprints/cover-784.7f758c5c29.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/rooting-sim-cards</loc>
    <lastmod>2013-07-21T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/rooting-sim-cards/cover-784.d553534e89.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/mobile-networks-differ</loc>
    <lastmod>2012-07-14T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/mobile-networks-differ/cover-500.c6d2f71de3.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/eft-vulns</loc>
    <lastmod>2012-07-12T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/eft-vulns/cover-784.1bceaf19ee.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/minisat-intro</loc>
    <lastmod>2011-05-17T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/minisat-intro/cover-784.156ae6342a.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/acs</loc>
    <lastmod>2010-09-16T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/acs/cover-500.41ffd0b223.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/decrypting-gsm</loc>
    <lastmod>2010-07-27T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/decrypting-gsm/cover-784.8a34d95cc2.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://srlabs.de/blog/analyzing-legic-prime-rfids</loc>
    <lastmod>2010-07-20T00:00:00.000Z</lastmod>
    <image:image>
      <image:loc>https://srlabs.de/img/content/blog/post-assets/analyzing-legic-prime-rfids/cover-784.31e36efcad.jpg</image:loc>
    </image:image>
  </url>
</urlset>