<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://blog.oscarai.tech</loc></url><url><loc>https://blog.oscarai.tech/about</loc></url><url><loc>https://blog.oscarai.tech/automatizacion</loc></url><url><loc>https://blog.oscarai.tech/blog</loc></url><url><loc>https://blog.oscarai.tech/ingenieria</loc></url><url><loc>https://blog.oscarai.tech/mis-ctf</loc></url><url><loc>https://blog.oscarai.tech/posts/c%C3%B3mo-mejorar-tu-cv-con-inteligencia-artificial-sin-convertirlo-en-texto-gen%C3%A9rico</loc></url><url><loc>https://blog.oscarai.tech/posts/campana-feliz-de-una-pista-p%C3%BAblica-a-root-por-mala-gesti%C3%B3n-de-accesos</loc></url><url><loc>https://blog.oscarai.tech/posts/devops-nightmare-una-cadena-dfir-pensada-para-leer-compromiso-persistencia-y-exfiltraci%C3%B3n</loc></url><url><loc>https://blog.oscarai.tech/posts/el-agente-que-piensa-antes-de-actuar</loc></url><url><loc>https://blog.oscarai.tech/posts/el-amigo-una-infecci%C3%B3n-sencilla-pensada-para-ense%C3%B1ar-persistencia-sabotaje-y-cuentas-ocultas</loc></url><url><loc>https://blog.oscarai.tech/posts/el-d%C3%ADa-que-puse-el-freno-de-mano</loc></url><url><loc>https://blog.oscarai.tech/posts/el-topo-dns-dise%C3%B1o-de-una-intrusi%C3%B3n-silenciosa-con-t%C3%BAnel-dns</loc></url><url><loc>https://blog.oscarai.tech/posts/hexthink-silent-shadow-lo-que-aprend%C3%AD-dise%C3%B1ando-una-cadena-de-compromiso-entre-base-de-datos-secretos-ocultos-y-privilegios-mal-delegados</loc></url><url><loc>https://blog.oscarai.tech/posts/la-evoluci%C3%B3n-del-prompting-json-o-texto-plano-desmitificando-la-comunicaci%C3%B3n-con-llms</loc></url><url><loc>https://blog.oscarai.tech/posts/llm-vs-slm-no-es-una-pelea-t%C3%A9cnica-es-una-batalla-de-narrativa</loc></url><url><loc>https://blog.oscarai.tech/posts/nodecaption-automatizaci%C3%B3n-expuesta-credenciales-reutilizadas-y-ejecuci%C3%B3n-remota-en-linux</loc></url><url><loc>https://blog.oscarai.tech/posts/operaci%C3%B3n-pescador-de-un-upload-expuesto-a-una-shell-web-y-una-escalada-trivial-por-suid</loc></url><url><loc>https://blog.oscarai.tech/posts/opsguard-ai-cuando-el-que-revisa-el-c%C3%B3digo-tambi%C3%A9n-es-una-ia</loc></url><url><loc>https://blog.oscarai.tech/posts/pinbreaker-dise%C3%B1ando-un-laboratorio-de-reversing-b%C3%A1sico-sobre-un-pin-hardcodeado</loc></url><url><loc>https://blog.oscarai.tech/posts/pinbreaker-una-app-android-pensada-para-ense%C3%B1ar-por-qu%C3%A9-ocultar-secretos-en-cliente-no-funciona</loc></url><url><loc>https://blog.oscarai.tech/posts/qwen-image-en-amd-y-nobara-cuando-el-problema-no-es-el-modelo</loc></url><url><loc>https://blog.oscarai.tech/posts/rastreo-de-un-binario-persistente-en-linux</loc></url><url><loc>https://blog.oscarai.tech/posts/rebind-una-cadena-dise%C3%B1ada-para-ense%C3%B1ar-c%C3%B3mo-peque%C3%B1os-fallos-terminan-en-compromiso-total</loc></url><url><loc>https://blog.oscarai.tech/posts/scape-room-dise%C3%B1ando-una-cadena-de-fallo-con-presi%C3%B3n-pistas-y-preloading</loc></url><url><loc>https://blog.oscarai.tech/posts/soberan%C3%ADa-en-ia-inferencia-local-de-alta-velocidad-sobre-silicio-amd-de-consumo</loc></url><url><loc>https://blog.oscarai.tech/posts/sre-y-ai-no-son-etiquetas</loc></url><url><loc>https://blog.oscarai.tech/posts/tenvy-v2-lo-que-aprend%C3%AD-tras-encerrarme-un-fin-de-semana-a-reescribir-la-plataforma</loc></url><url><loc>https://blog.oscarai.tech/posts/vibe-coding-con-claude-lo-que-nadie-te-cuenta-sobre-trabajar-con-llms-en-devops</loc></url><url><loc>https://blog.oscarai.tech/projects</loc></url><url><loc>https://blog.oscarai.tech/projects/tenvy</loc></url><url><loc>https://blog.oscarai.tech/sre</loc></url></urlset>