{"id":2964,"date":"2025-04-04T04:30:51","date_gmt":"2025-04-04T04:30:51","guid":{"rendered":"https:\/\/www.hackmosphere.fr\/site-map\/"},"modified":"2025-04-04T04:30:57","modified_gmt":"2025-04-04T04:30:57","slug":"site-map","status":"publish","type":"page","link":"https:\/\/www.hackmosphere.fr\/en\/site-map\/","title":{"rendered":"Site map"},"content":{"rendered":"<div class=\"wrap-html-sitemap sp-html-sitemap\"><div class=\"sp-wrap-cpt\"><h2 class=\"sp-cpt-name\">Pages<\/h2><ul class=\"sp-list-posts sp-cpt-hierarchical\"><li class=\"page_item page-item-3968\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/training-program-pentest-systems-networks\/\">Training Program: Pentest Systems &amp; Networks<\/a><\/li><li class=\"page_item page-item-3850\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/terms-of-use\/\">Terms of use<\/a><\/li><li class=\"page_item page-item-3831\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/privacy-policy-2\/\">Privacy policy<\/a><\/li><li class=\"page_item page-item-2964\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/site-map\/\">Site map<\/a><\/li><li class=\"page_item page-item-2823\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/merci-audit\/\">Merci-audit<\/a><\/li><li class=\"page_item page-item-2813\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/contact-audit\/\">Contact-Audit<\/a><\/li><li class=\"page_item page-item-2719\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/cookie-policy-eu\/\">Cookie policy (EU)<\/a><\/li><li class=\"page_item page-item-2689\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/general-terms-and-conditions\/\">General terms and conditions<\/a><\/li><li class=\"page_item page-item-2681\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/blog\/\">Blog<\/a><\/li><li class=\"page_item page-item-2622\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/our-training-courses\/\">Our training courses<\/a><\/li><li class=\"page_item page-item-2629\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/red-team\/\">Red Team<\/a><\/li><li class=\"page_item page-item-2633\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/phishing\/\">Phishing<\/a><\/li><li class=\"page_item page-item-2639\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/physical-pentesting\/\">Physical Pentesting<\/a><\/li><li class=\"page_item page-item-2620\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/pentest-cyber\/\">Cyber pentesting<\/a><\/li><li class=\"page_item page-item-2601\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/our-services\/\">Our services<\/a><\/li><li class=\"page_item page-item-2627\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/about-us\/\">About us<\/a><\/li><li class=\"page_item page-item-2594\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/contact\/\">Contact<\/a><\/li><li class=\"page_item page-item-2634\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/\">Home<\/a><\/li><li class=\"page_item page-item-2593\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/privacy-policy\/\">Privacy policy<\/a><\/li><\/ul><\/div><div class=\"sp-wrap-cpt\"><h2 class=\"sp-cpt-name\">Posts<\/h2><div class=\"sp-wrap-cats\"><div class=\"sp-wrap-cat\"><h3 class=\"sp-cat-name\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/category\/cyber-services\/\">Cyber Services<\/a><\/h3><ul class=\"sp-list-posts\"><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/pentest-of-a-100-vibe-encoded-app-complete-security-analysis-of-an-ai-generated-app\/\">Pentest of a 100% vibe-encoded app: complete security analysis of an AI-generated app<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-an-intrusion-test\/\">What is an intrusion test?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/how-do-you-perform-a-penetration-test-for-a-web-application\/\">How do you perform a penetration test for a web application?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/bypassing-windows-defender-antivirus-in-2025-evasion-techniques-using-direct-syscalls-and-xor-encryption-part-1\/\">Bypassing Windows Defender antivirus in 2025: Evasion Techniques Using Direct Syscalls and XOR Encryption &#8211; Part 1<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/how-to-obtain-a-time-based-blind-sql-injection-and-automate-by-modifying-sqlmap\/\">How to obtain a time-based blind SQL injection and automate by modifying SQLMAP?<\/a><\/li><\/ul><\/div><div class=\"sp-wrap-cat\"><h3 class=\"sp-cat-name\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/category\/human-services\/\">Human Services<\/a><\/h3><ul class=\"sp-list-posts\"><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-an-intrusion-test\/\">What is an intrusion test?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/phishing-campaign-are-decision-makers-vulnerable\/\">Phishing campaign: Are decision-makers vulnerable?<\/a><\/li><\/ul><\/div><div class=\"sp-wrap-cat\"><h3 class=\"sp-cat-name\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/category\/other\/\">Other<\/a><\/h3><ul class=\"sp-list-posts\"><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/how-can-you-protect-your-business-from-cyber-attacks\/\">How can you protect your business from cyber attacks?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/how-to-carry-out-an-effective-penetration-test-on-an-internal-corporate-network\/\">How to carry out an effective penetration test on an internal corporate network?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-a-ptes-penetration-testing-execution-standard\/\">What is a PTES (Penetration Testing Execution Standard)?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/how-to-create-a-fake-phishing-campaign\/\">How to create a fake phishing campaign<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/penetration-testing-black-box-white-box-and-gray-box\/\">Penetration testing: black box, white box and gray box<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/pentest-quotation-and-pricing\/\">Pentest: quotation and pricing<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/need-an-expert-in-penetration-testing\/\">Need an expert in penetration testing?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-a-firewall-pentest\/\">What is a firewall pentest?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-a-jenkins-pentest\/\">What is a Jenkins pentest?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-a-linux-pentest\/\">What is a Linux pentest?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-an-owasp-pentest\/\">What is an OWASP pentest?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/pentest-toulouse-how-to-carry-out-a-penetration-test-for-your-company\/\">Pentest Toulouse (31): how to carry out a penetration test for your company?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/pentest-lyon-who-to-contact-for-a-physical-intrusion-test\/\">Who should I contact to carry out a pentest in Lyon (69)?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/pentest-lille-physical-intrusion-testing\/\">Pentest Lille (59): what is a penetration test?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/pentest-paris-physical-penetration-testing\/\">Who to call for a pentest in Paris (75)?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-an-external-pentest\/\">What is an external pentest?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/cyber-pentest-what-is-it-and-why-is-it-useful\/\">What is a cyber pentest and what is its purpose?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/industrial-pentest-how-can-it-help-you-identify-and-correct-vulnerabilities\/\">Industrial Pentest: How can it help you identify and correct vulnerabilities?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-a-pentest\/\">What is the definition of a pentest?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-are-the-differences-between-pentest-black-box-white-box-and-grey-box\/\">What are the differences between Pentest Black Box, White Box and Grey Box?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/whats-the-difference-between-red-team-and-blue-team\/\">What&#8217;s the difference between Red Team and Blue Team?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-are-the-differences-between-red-team-and-pentest\/\">What are the differences between Red Team and Pentest?<\/a><\/li><\/ul><\/div><div class=\"sp-wrap-cat\"><h3 class=\"sp-cat-name\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/category\/physical-services\/\">Physical Services<\/a><\/h3><ul class=\"sp-list-posts\"><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-an-intrusion-test\/\">What is an intrusion test?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/in-store-physical-pentest-feedback-on-a-real-case-study\/\">In-store physical Pentest: feedback on a real case study<\/a><\/li><\/ul><\/div><div class=\"sp-wrap-cat\"><h3 class=\"sp-cat-name\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/category\/red-team\/\">Red Team<\/a><\/h3><ul class=\"sp-list-posts\"><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/how-can-you-protect-your-business-from-cyber-attacks\/\">How can you protect your business from cyber attacks?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/pentest-of-a-100-vibe-encoded-app-complete-security-analysis-of-an-ai-generated-app\/\">Pentest of a 100% vibe-encoded app: complete security analysis of an AI-generated app<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-a-ptes-penetration-testing-execution-standard\/\">What is a PTES (Penetration Testing Execution Standard)?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/how-to-create-a-fake-phishing-campaign\/\">How to create a fake phishing campaign<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/penetration-testing-black-box-white-box-and-gray-box\/\">Penetration testing: black box, white box and gray box<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/what-is-an-owasp-pentest\/\">What is an OWASP pentest?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/industrial-pentest-how-can-it-help-you-identify-and-correct-vulnerabilities\/\">Industrial Pentest: How can it help you identify and correct vulnerabilities?<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/bypass-windows-defender-antivirus-in-2025-evasion-techniques-using-direct-syscalls-and-xor-encryption-part-2\/\">Bypass Windows Defender antivirus in 2025: Evasion Techniques Using Direct Syscalls and XOR encryption &#8211; Part 2<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/bypassing-windows-defender-antivirus-in-2025-evasion-techniques-using-direct-syscalls-and-xor-encryption-part-1\/\">Bypassing Windows Defender antivirus in 2025: Evasion Techniques Using Direct Syscalls and XOR Encryption &#8211; Part 1<\/a><\/li><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/in-store-physical-pentest-feedback-on-a-real-case-study\/\">In-store physical Pentest: feedback on a real case study<\/a><\/li><\/ul><\/div><div class=\"sp-wrap-cat\"><h3 class=\"sp-cat-name\"><a href=\"https:\/\/www.hackmosphere.fr\/en\/category\/red-teaming-en\/\">Red Teaming<\/a><\/h3><ul class=\"sp-list-posts\"><li><a href=\"https:\/\/www.hackmosphere.fr\/en\/bypassing-windows-defender-antivirus-in-2025-evasion-techniques-using-direct-syscalls-and-xor-encryption-part-1\/\">Bypassing Windows Defender antivirus in 2025: Evasion Techniques Using Direct Syscalls and XOR Encryption &#8211; Part 1<\/a><\/li><\/ul><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2964","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/comments?post=2964"}],"version-history":[{"count":1,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2964\/revisions"}],"predecessor-version":[{"id":2966,"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/pages\/2964\/revisions\/2966"}],"wp:attachment":[{"href":"https:\/\/www.hackmosphere.fr\/en\/wp-json\/wp\/v2\/media?parent=2964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}