<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//novee.security/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://novee.security/blog/</loc>
		<lastmod>2026-05-12T21:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://novee.security/blog/claude-mythos-project-glasswing-ai-security-research-vs-continuous-testing/</loc>
		<lastmod>2026-04-16T07:42:14+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/Mythos-_-Project-Glasswing-Blog-Post-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/ai-pentesting-market-ido-geffen-rsac-2026/</loc>
		<lastmod>2026-04-16T07:42:20+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/weavy-Gemini-3-Nano-Banana-Pro-2026-01-04-at-23.31.07-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/chatgpt-pentesting-limitations/</loc>
		<lastmod>2026-04-16T07:42:25+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/Top-Limitations-of-ChatGPT-Pentesting-in-2026.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/rsac-2026-offensive-security-ai-pentesting/</loc>
		<lastmod>2026-04-16T07:42:31+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/weavy-Gemini-3-Nano-Banana-Pro-2025-12-31-at-18.38.55-copy-5-2-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/ai-red-teaming-reshaping-modern-defense-strategies/</loc>
		<lastmod>2026-04-16T07:42:39+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/How-AI-Red-Teaming-is-Reshaping-Modern-Defense-Strategies-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/ai-penetration-testing-buyers-guide-2026/</loc>
		<lastmod>2026-04-16T07:42:44+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/ChatGPT-Image-Mar-26-2026-12_48_58-PM.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/image1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/novee-ai-red-teaming-llm-applications-securityweek/</loc>
		<lastmod>2026-04-16T07:42:49+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/Security-week.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/novee-introduces-autonomous-ai-red-teaming-for-llm-helpnetsecurity/</loc>
		<lastmod>2026-04-16T07:42:55+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/ChatGPT-Image-Mar-25-2026-03_47_40-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/novee-launches-ai-red-teaming-tool-for-llm-app-risks-securitybrief/</loc>
		<lastmod>2026-04-16T07:43:00+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/ChatGPT-Image-Mar-25-2026-04_01_47-PM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/ai-penetration-testing-novee-interview/</loc>
		<lastmod>2026-04-16T07:43:05+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/Venture-Beat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/continuous-offensive-security-testing-gartner/</loc>
		<lastmod>2026-04-16T07:43:10+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/weavy-Gemini-3-Nano-Banana-Pro-2026-01-03-at-12.32.06-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/ai-changing-cyber-economy-offensive-security/</loc>
		<lastmod>2026-04-16T07:43:20+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/weavy-Gemini-3-Nano-Banana-Pro-2026-01-05-at-00.12.17-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/training-security-ai-environments/</loc>
		<lastmod>2026-04-16T07:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/weavy-Gemini-3-Nano-Banana-Pro-2026-01-04-at-23.31.07-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/pipeline-diagram-1.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/autonomous-ai-penetration-testing-2/</loc>
		<lastmod>2026-04-16T07:43:32+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/novee_Gemini-3-Nano-Banana-Pro_2026-03-07_19-14-53-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/top-ai-penetration-testing-offensive-security-events-rsac-2026/</loc>
		<lastmod>2026-04-16T07:43:37+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/ChatGPT-Image-Mar-4-2026-10_29_35-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/autonomous-ai-penetration-testing/</loc>
		<lastmod>2026-04-16T07:43:42+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/continuous-ai-pentesting.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/external-network-penetration-testing/</loc>
		<lastmod>2026-04-16T07:43:47+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/novee_Gemini-3-Nano-Banana-Pro_2026-03-07_19-24-37-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/ai-can-find-bugs-but-can-it-prove-youre-actually-secure/</loc>
		<lastmod>2026-04-16T07:43:53+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/novee_Gemini-3-Nano-Banana-Pro_2026-03-07_19-38-41-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/agentic-ai-pentesting-top-threats-defense/</loc>
		<lastmod>2026-04-16T07:43:58+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/novee_Gemini-3-Nano-Banana-Pro_2026-03-07_19-36-22-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/pdf-platform-vulnerabilities-account-takeover-data-exfiltration/</loc>
		<lastmod>2026-04-16T07:44:03+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/Security-week.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/hacker-trained-ai-discovers-16-new-0-day-vulnerabilities-in-pdf-engines/</loc>
		<lastmod>2026-04-16T07:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/image-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/Presentacion-Estrategia-de-Venta-Moderno-Azul-y-Beige.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/image-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/image-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/image-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/image-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/from-pdf-to-pwn-scalable-0day-discovery-in-pdf-engines-and-services-using-multi-agent-llms-2/</loc>
		<lastmod>2026-04-16T07:44:13+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/image.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/4.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/5.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/newwww.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/Screenshot-2026-01-20-at-14.27.33.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/Screenshot-2026-01-20-at-14.28.36.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/Screenshot-2026-01-20-at-14.37.20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/15.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/16.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/result-1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/result-2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/result-3.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/image-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/objetivo-2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/objetivo-3.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/objetivo-4.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/objetivo-5.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/AA1.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/AA2.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/AA3.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/02/AA4.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/venturebeat-novee-launch-ai-offensive-security/</loc>
		<lastmod>2026-04-16T07:44:18+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/Venture-Beat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/wsj-novee-launch-ai-offensive-security/</loc>
		<lastmod>2026-04-16T07:44:23+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/WSJ.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/securityweek-novee-launch-ai-offensive-security/</loc>
		<lastmod>2026-04-16T07:44:27+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/Security-week.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/forbes-novee-launch-ai-offensive-security/</loc>
		<lastmod>2026-04-16T07:44:32+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/Forbes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/axios-novee-launch-ai-offensive-security/</loc>
		<lastmod>2026-04-16T07:44:37+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/Axios.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/novee-raises-51-5m-to-transform-offensive-security/</loc>
		<lastmod>2026-04-16T07:44:41+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/post-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/were-here.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/novee-team-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/Novee-founders-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/how-novee-discovered-cve-2025-10240-in-progress-flowmon/</loc>
		<lastmod>2026-04-16T07:44:55+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/post-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/why-small-purpose-trained-ai-models-beat-frontier-llms-at-offensive-security/</loc>
		<lastmod>2026-04-16T07:45:01+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2025/12/thumb-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/teaching-a-small-model-to-hack-like-a-real-attacker/</loc>
		<lastmod>2026-04-16T07:45:07+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2025/12/thumb-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/why-we-are-building-novee/</loc>
		<lastmod>2026-04-16T07:45:13+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2025/12/thumb-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/novee-team.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/pentesting-vs-red-teaming-differences-how-to-choose/</loc>
		<lastmod>2026-04-16T17:23:07+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/Pentesting-vs.-Red-Teaming-Key-Differences-and-How-to-Choose.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/modern-application-penetration-testing/</loc>
		<lastmod>2026-04-23T17:34:38+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/Modern-Application-Penetration-Testing-scaled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/signs-annual-pentest-report/</loc>
		<lastmod>2026-05-01T17:57:49+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/7-Signs-Your-Annual-Pentest-Report-Is-Already-Outdated-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/google-gemini-cli-rce-vulnerability-cvss-10-critical-security-advisory/</loc>
		<lastmod>2026-05-01T17:58:41+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/weavy-Gemini-3-Nano-Banana-Pro-2026-01-04-at-22.25.29-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/k-health/</loc>
		<lastmod>2026-05-05T19:26:48+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/KHealth.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/cresta/</loc>
		<lastmod>2026-05-05T19:27:11+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/Cresta.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/reco/</loc>
		<lastmod>2026-05-05T19:28:06+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/Reco.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/telit-cinterion/</loc>
		<lastmod>2026-05-05T19:28:33+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/Telit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/sentra-cto-compliance-gaps-ai-pentesting/</loc>
		<lastmod>2026-05-05T21:09:48+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/Sentra.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/uipath/</loc>
		<lastmod>2026-05-05T21:10:40+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/UiPath.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/hibob/</loc>
		<lastmod>2026-05-05T21:16:43+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/HiBob.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/gemini-cli-rce-vulnerability-novee-security/</loc>
		<lastmod>2026-05-06T12:51:11+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/Security-week.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/gemini-cli-cvss-10-rce-novee-security/</loc>
		<lastmod>2026-05-06T12:59:43+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/ChatGPT-Image-May-6-2026-09_57_47-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/gemini-cli-cvss-10-cicd-vulnerability-novee-security/</loc>
		<lastmod>2026-05-06T13:04:26+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/ChatGPT-Image-May-6-2026-10_03_21-AM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/cursor-ide-cve-2026-26268-git-hook-arbitrary-code-execution/</loc>
		<lastmod>2026-05-06T15:55:56+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/1-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/ai-red-teaming-llm-applications/</loc>
		<lastmod>2026-05-06T15:56:38+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/image1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/03/image2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/jb-poindexter-ciso-continuous-security-validation/</loc>
		<lastmod>2026-05-07T18:29:24+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/JBPoindexterco.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/owasp-apts-autonomous-penetration-testing-standard/</loc>
		<lastmod>2026-05-08T13:12:10+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/01/3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/best-web-application-security-testing-tools-2026/</loc>
		<lastmod>2026-05-08T13:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/05/Blog-Header_-16-Best-Web-Application-Security-Testing-Tools-of-2026-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://novee.security/blog/dast-scanner-limitations/</loc>
		<lastmod>2026-05-12T21:29:06+00:00</lastmod>
		<image:image>
			<image:loc>https://novee.security/wp-content/uploads/2026/04/weavy-Gemini-3-Nano-Banana-Pro-2026-01-04-at-22.25.29-2.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->