<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/nmap.svg</image:loc>
      <image:title>Nmap - Network Mapper</image:title>
      <image:caption>Industry-standard network mapper for host discovery and port scanning</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/zap.svg</image:loc>
      <image:title>OWASP ZAP - Web Application Scanner</image:title>
      <image:caption>Open-source web application security scanner for OWASP Top 10</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/nuclei.svg</image:loc>
      <image:title>Nuclei - Template-Based Vulnerability Scanner</image:title>
      <image:caption>Vulnerability scanner with 8000+ community templates</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/nikto.svg</image:loc>
      <image:title>Nikto2 - Web Server Scanner</image:title>
      <image:caption>Comprehensive web server scanner for dangerous files and misconfigs</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/openvas.svg</image:loc>
      <image:title>OpenVAS - Vulnerability Assessment</image:title>
      <image:caption>Full vulnerability assessment with 100000+ NVT checks</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/testssl.svg</image:loc>
      <image:title>TestSSL - TLS/SSL Analysis</image:title>
      <image:caption>Deep TLS/SSL analysis for cipher suites and protocol vulnerabilities</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/subfinder.svg</image:loc>
      <image:title>Subfinder - Subdomain Discovery</image:title>
      <image:caption>Passive subdomain enumeration using multiple sources</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/httpx.svg</image:loc>
      <image:title>HTTPX - HTTP Probing Tool</image:title>
      <image:caption>HTTP probing and technology fingerprinting</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/ffuf.svg</image:loc>
      <image:title>FFUF - Web Fuzzer</image:title>
      <image:caption>Fast directory and file brute-forcing for hidden endpoints</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/wafw00f.svg</image:loc>
      <image:title>Wafw00f - WAF Detection</image:title>
      <image:caption>Web Application Firewall detection and fingerprinting</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/gitleaks.svg</image:loc>
      <image:title>Gitleaks - Secret Scanner</image:title>
      <image:caption>Secret scanning for hardcoded API keys, tokens, and credentials</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/semgrep.svg</image:loc>
      <image:title>Semgrep - Static Analysis (SAST)</image:title>
      <image:caption>Static application security testing for code vulnerabilities</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/trivy.svg</image:loc>
      <image:title>Trivy - Software Composition Analysis</image:title>
      <image:caption>SCA scanner for dependency vulnerabilities</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/tools/pentesttools.svg</image:loc>
      <image:title>IntegSec PentestTools</image:title>
      <image:caption>Custom toolkit for business logic testing and API security analysis</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/</loc>
    <image:image>
      <image:loc>https://turbopentest.com/opengraph-image</image:loc>
      <image:title>TurboPentest - Agentic AI Penetration Testing for SaaS</image:title>
      <image:caption>Blockchain-attested AI pentesting from $49</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/pricing</loc>
    <image:image>
      <image:loc>https://turbopentest.com/pricing/opengraph-image</image:loc>
      <image:title>TurboPentest Pricing - Plans from $49</image:title>
      <image:caption>Recon, Standard, Deep, and Blitz pentest tiers</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/how-it-works</loc>
    <image:image>
      <image:loc>https://turbopentest.com/how-it-works/opengraph-image</image:loc>
      <image:title>How TurboPentest Works - 15 Security Tools</image:title>
      <image:caption>AI agents orchestrate 15 professional security tools</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/integrations</loc>
    <image:image>
      <image:loc>https://turbopentest.com/integrations/opengraph-image</image:loc>
      <image:title>TurboPentest Integrations - VS Code, Burp Suite Pro</image:title>
      <image:caption>Dashboard, VS Code extension, and Burp Suite Pro plugin</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/benchmarks</loc>
    <image:image>
      <image:loc>https://turbopentest.com/benchmarks/opengraph-image</image:loc>
      <image:title>TurboPentest Benchmarks - Security Tool Performance</image:title>
      <image:caption>Performance benchmarks and detection accuracy</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/demo</loc>
    <image:image>
      <image:loc>https://turbopentest.com/demo/opengraph-image</image:loc>
      <image:title>TurboPentest Demo - See AI Pentesting in Action</image:title>
      <image:caption>Interactive demo of agentic penetration testing</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/security</loc>
    <image:image>
      <image:loc>https://turbopentest.com/security/opengraph-image</image:loc>
      <image:title>TurboPentest Security Practices</image:title>
      <image:caption>Our security posture and responsible disclosure</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/learn</loc>
    <image:image>
      <image:loc>https://turbopentest.com/learn/opengraph-image</image:loc>
      <image:title>TurboPentest Learning Center</image:title>
      <image:caption>Free cybersecurity courses and certifications</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/</loc>
    <image:image>
      <image:loc>https://turbopentest.com/media/svg/logo-wordmark-on-dark.svg</image:loc>
      <image:title>TurboPentest Logo</image:title>
      <image:caption>TurboPentest by IntegSec - agentic AI penetration testing</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/media</loc>
    <image:image>
      <image:loc>https://turbopentest.com/media/png/monogram/512.png</image:loc>
      <image:title>TurboPentest Monogram</image:title>
      <image:caption>TurboPentest TP monogram icon</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/passwordless-authentication-just-opened-new-attack-surfaces-your-complete-webauthn-fido2-penetration-testing-guide</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/passwordless-authentication-just-opened-new-attack-surfaces-your-complete-webauthn-fido2-penetration-testing-guide/opengraph-image</image:loc>
      <image:title>Passwordless Authentication Just Opened New Attack Surfaces: Your Complete WebAuthn &amp; FIDO2 Penetration Testing Guide</image:title>
      <image:caption>Blog post: Passwordless Authentication Just Opened New Attack Surfaces: Your Complete WebAuthn &amp; FIDO2 Penetration Testing Guide</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/why-78-of-companies-still-can-t-detect-lateral-movement-the-penetration-testing-blind-spot-costing-millions</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/why-78-of-companies-still-can-t-detect-lateral-movement-the-penetration-testing-blind-spot-costing-millions/opengraph-image</image:loc>
      <image:title>Why 78% of Companies Still Can&apos;t Detect Lateral Movement—The Penetration Testing Blind Spot Costing Millions</image:title>
      <image:caption>Blog post: Why 78% of Companies Still Can&apos;t Detect Lateral Movement—The Penetration Testing Blind Spot Costing Millions</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/nis2-compliance-checklist-how-to-audit-your-penetration-testing-program-before-2025</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/nis2-compliance-checklist-how-to-audit-your-penetration-testing-program-before-2025/opengraph-image</image:loc>
      <image:title>NIS2 Compliance Checklist: How to Audit Your Penetration Testing Program Before 2025</image:title>
      <image:caption>Blog post: NIS2 Compliance Checklist: How to Audit Your Penetration Testing Program Before 2025</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/ai-powered-phishing-attacks-are-getting-smarter-here-s-how-to-detect-them</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/ai-powered-phishing-attacks-are-getting-smarter-here-s-how-to-detect-them/opengraph-image</image:loc>
      <image:title>AI-Powered Phishing Attacks Are Getting Smarter—Here&apos;s How to Detect Them</image:title>
      <image:caption>Blog post: AI-Powered Phishing Attacks Are Getting Smarter—Here&apos;s How to Detect Them</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/the-dora-compliance-reality-check-operational-resilience-testing-explained</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/the-dora-compliance-reality-check-operational-resilience-testing-explained/opengraph-image</image:loc>
      <image:title>The DORA Compliance Reality Check: Operational Resilience Testing Explained</image:title>
      <image:caption>Blog post: The DORA Compliance Reality Check: Operational Resilience Testing Explained</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/zero-day-exploits-in-2025-why-your-penetration-tests-might-miss-what-you-can-t-see</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/zero-day-exploits-in-2025-why-your-penetration-tests-might-miss-what-you-can-t-see/opengraph-image</image:loc>
      <image:title>Zero-Day Exploits in 2025: Why Your Penetration Tests Might Miss What You Can&apos;t See</image:title>
      <image:caption>Blog post: Zero-Day Exploits in 2025: Why Your Penetration Tests Might Miss What You Can&apos;t See</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/ai-generated-malware-how-security-teams-are-testing-defenses-against-synthetic-attack-vectors</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/ai-generated-malware-how-security-teams-are-testing-defenses-against-synthetic-attack-vectors/opengraph-image</image:loc>
      <image:title>AI-Generated Malware: How Security Teams Are Testing Defenses Against Synthetic Attack Vectors</image:title>
      <image:caption>Blog post: AI-Generated Malware: How Security Teams Are Testing Defenses Against Synthetic Attack Vectors</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/why-your-security-team-can-t-patch-fast-enough-the-24-hour-cve-window-reality-check</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/why-your-security-team-can-t-patch-fast-enough-the-24-hour-cve-window-reality-check/opengraph-image</image:loc>
      <image:title>Why Your Security Team Can&apos;t Patch Fast Enough: The 24-Hour CVE Window Reality Check</image:title>
      <image:caption>Blog post: Why Your Security Team Can&apos;t Patch Fast Enough: The 24-Hour CVE Window Reality Check</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/sec-cybersecurity-rules-2024-what-public-companies-need-to-know-about-penetration-testing</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/sec-cybersecurity-rules-2024-what-public-companies-need-to-know-about-penetration-testing/opengraph-image</image:loc>
      <image:title>SEC Cybersecurity Rules 2024: What Public Companies Need to Know About Penetration Testing</image:title>
      <image:caption>Blog post: SEC Cybersecurity Rules 2024: What Public Companies Need to Know About Penetration Testing</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/5-security-mistakes-ai-generated-code-makes</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/5-security-mistakes-ai-generated-code-makes/opengraph-image</image:loc>
      <image:title>5 Security Mistakes AI-Generated Code Makes</image:title>
      <image:caption>Blog post: 5 Security Mistakes AI-Generated Code Makes</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/why-your-cursor-built-app-needs-a-security-check</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/why-your-cursor-built-app-needs-a-security-check/opengraph-image</image:loc>
      <image:title>Why Your Cursor-Built App Needs a Security Check</image:title>
      <image:caption>Blog post: Why Your Cursor-Built App Needs a Security Check</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/fix-with-ai-remediate-security-vulnerabilities-in-30-seconds</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/fix-with-ai-remediate-security-vulnerabilities-in-30-seconds/opengraph-image</image:loc>
      <image:title>Fix with AI: How to Remediate Security Vulnerabilities in 30 Seconds</image:title>
      <image:caption>Blog post: Fix with AI: How to Remediate Security Vulnerabilities in 30 Seconds</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/pentest-notes-best-practices</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/pentest-notes-best-practices/opengraph-image</image:loc>
      <image:title>Pentest Notes Best Practices: How to Guide TurboPentest&apos;s AI Agents</image:title>
      <image:caption>Blog post: Pentest Notes Best Practices: How to Guide TurboPentest&apos;s AI Agents</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/silent-data-exfiltration-via-dns-tunneling-the-attack-your-dlp-completely-misses-and-how-penetration-tests-must-catch-it</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/silent-data-exfiltration-via-dns-tunneling-the-attack-your-dlp-completely-misses-and-how-penetration-tests-must-catch-it/opengraph-image</image:loc>
      <image:title>Silent Data Exfiltration via DNS Tunneling: The Attack Your DLP Completely Misses (And How Penetration Tests Must Catch It)</image:title>
      <image:caption>Blog post: Silent Data Exfiltration via DNS Tunneling: The Attack Your DLP Completely Misses (And How Penetration Tests Must Catch It)</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://turbopentest.com/blog/the-legitimate-cloud-admin-tool-abuse-epidemic-how-attackers-hide-in-plain-sight-for-200-days</loc>
    <image:image>
      <image:loc>https://turbopentest.com/blog/the-legitimate-cloud-admin-tool-abuse-epidemic-how-attackers-hide-in-plain-sight-for-200-days/opengraph-image</image:loc>
      <image:title>The Legitimate Cloud Admin Tool Abuse Epidemic: How Attackers Hide in Plain Sight for 200+ Days</image:title>
      <image:caption>Blog post: The Legitimate Cloud Admin Tool Abuse Epidemic: How Attackers Hide in Plain Sight for 200+ Days</image:caption>
    </image:image>
  </url>
</urlset>