<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://trailofbits.com/2025/</loc></url><url><loc>https://trailofbits.com/about/</loc></url><url><loc>https://trailofbits.com/services/software-assurance/ai-ml/</loc></url><url><loc>https://trailofbits.com/aiml-training/</loc></url><url><loc>https://trailofbits.com/services/software-assurance/appsec/</loc></url><url><loc>https://trailofbits.com/services/knowledge-repository/binary-ninja/</loc></url><url><loc>https://trailofbits.com/services/software-assurance/blockchain/</loc></url><url><loc>https://trailofbits.com/brand/</loc></url><url><loc>https://trailofbits.com/bsides-lunch/</loc></url><url><loc>https://trailofbits.com/buttercup/</loc></url><url><loc>https://trailofbits.com/buttercup/qr/</loc></url><url><loc>https://trailofbits.com/careers/</loc></url><url><loc>https://trailofbits.com/categories/</loc></url><url><loc>https://trailofbits.com/contact/</loc></url><url><loc>https://trailofbits.com/services/knowledge-repository/control-flow-integrity/</loc></url><url><loc>https://trailofbits.com/services/software-assurance/cryptography/</loc></url><url><loc>https://trailofbits.com/services/knowledge-repository/ctf-field-guide/</loc></url><url><loc>https://trailofbits.com/services/published-research/cyber-fault-tolerant-attack-recovery-cfar/</loc></url><url><loc>https://trailofbits.com/services/published-research/cyber-reasoning-system-crs/</loc></url><url><loc>https://trailofbits.com/services/knowledge-repository/cybersecurity-policy/</loc></url><url><loc>https://trailofbits.com/devconnect/</loc></url><url><loc>https://trailofbits.com/services/knowledge-repository/empire-hacking/</loc></url><url><loc>https://trailofbits.com/ethcc/</loc></url><url><loc>https://trailofbits.com/forrester/</loc></url><url><loc>https://trailofbits.com/services/published-research/leveraging-the-analog-domain-for-security-lads/</loc></url><url><loc>https://trailofbits.com/newsletter/</loc></url><url><loc>https://trailofbits.com/services/knowledge-repository/nyc-infosec/</loc></url><url><loc>https://trailofbits.com/opensource/</loc></url><url><loc>https://trailofbits.com/services/published-research/pointsto-cft/</loc></url><url><loc>https://trailofbits.com/products/</loc></url><url><loc>https://trailofbits.com/reports/</loc></url><url><loc>https://trailofbits.com/services/research-and-development/</loc></url><url><loc>https://trailofbits.com/resources/</loc></url><url><loc>https://trailofbits.com/services/knowledge-repository/ruby-security-field-guide/</loc></url><url><loc>https://trailofbits.com/mcp/</loc></url><url><loc>https://trailofbits.com/services/security-engineering/</loc></url><url><loc>https://trailofbits.com/services/</loc></url><url><loc>https://trailofbits.com/services/published-research/sienna-locomotive/</loc></url><url><loc>https://trailofbits.com/services/software-assurance/</loc></url><url><loc>https://trailofbits.com/tags/</loc></url><url><loc>https://trailofbits.com/</loc></url><url><loc>https://trailofbits.com/tee/</loc></url><url><loc>https://trailofbits.com/resources/vulnerability-disclosure-policy/</loc></url></urlset>