<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 10:33 PM by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://hackarchive.in/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Kalp Shah | HackArchives</title>
		<link><![CDATA[https://hackarchive.in]]></link>
		<description><![CDATA[Kalp Shah | HackArchives]]></description>
		<lastBuildDate><![CDATA[Wed, 01 Apr 2026 10:45:28 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://hackarchive.in/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://hackarchive.in/supply-chain-attack/]]></guid>
			<link><![CDATA[https://hackarchive.in/supply-chain-attack/]]></link>
			<title>The Shocking Backdoor You Willingly Installed: Supply Chain Security</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 10:45:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-3-payment-channels/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-3-payment-channels/]]></link>
			<title>PART 3 : PAYMENT CHANNELS</title>
			<pubDate><![CDATA[Tue, 18 Jun 2024 09:46:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/]]></guid>
			<link><![CDATA[https://hackarchive.in/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Sun, 08 Sep 2024 09:07:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/sql-injections/]]></guid>
			<link><![CDATA[https://hackarchive.in/sql-injections/]]></link>
			<title>SQL INJECTIONS</title>
			<pubDate><![CDATA[Wed, 06 Nov 2024 16:20:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/cross-site-scripting/]]></guid>
			<link><![CDATA[https://hackarchive.in/cross-site-scripting/]]></link>
			<title>CROSS SITE SCRIPTING</title>
			<pubDate><![CDATA[Wed, 06 Nov 2024 15:43:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/blogs/]]></guid>
			<link><![CDATA[https://hackarchive.in/blogs/]]></link>
			<title>Blogs</title>
			<pubDate><![CDATA[Wed, 06 Nov 2024 11:18:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/blogs/cyber-security/]]></guid>
			<link><![CDATA[https://hackarchive.in/blogs/cyber-security/]]></link>
			<title>CYBER SECURITY</title>
			<pubDate><![CDATA[Wed, 01 Apr 2026 10:46:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/blogs/blockchain-security/]]></guid>
			<link><![CDATA[https://hackarchive.in/blogs/blockchain-security/]]></link>
			<title>BLOCKCHAIN SECURITY</title>
			<pubDate><![CDATA[Sun, 07 Jul 2024 09:58:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-3-exploiting-the-dapp/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-3-exploiting-the-dapp/]]></link>
			<title>PART 3 : EXPLOITING THE DAPP</title>
			<pubDate><![CDATA[Sat, 28 Sep 2024 02:58:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-2-setting-up-reentrant-pirates/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-2-setting-up-reentrant-pirates/]]></link>
			<title>PART 2 : SETTING UP REENTRANT PIRATES</title>
			<pubDate><![CDATA[Sun, 07 Jul 2024 05:35:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-1-introduction-to-reentrancy/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-1-introduction-to-reentrancy/]]></link>
			<title>PART 1 : INTRODUCTION TO REENTRANCY</title>
			<pubDate><![CDATA[Wed, 03 Jul 2024 09:07:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-3-components-of-zero-trust-model/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-3-components-of-zero-trust-model/]]></link>
			<title>COMPONENTS OF ZERO TRUST MODEL</title>
			<pubDate><![CDATA[Wed, 19 Jun 2024 08:56:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-2-role-bac-and-attribute-bac/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-2-role-bac-and-attribute-bac/]]></link>
			<title>PART 2 : ROLE-BAC &amp; ATTRIBUTE-BAC</title>
			<pubDate><![CDATA[Wed, 19 Jun 2024 08:18:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-1-introduction-to-zero-trust-architecture/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-1-introduction-to-zero-trust-architecture/]]></link>
			<title>PART 1 : INTRODUCTION TO ZERO TRUST ARCHITECTURE</title>
			<pubDate><![CDATA[Wed, 19 Jun 2024 05:53:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/blogs/open-source-intelligence/]]></guid>
			<link><![CDATA[https://hackarchive.in/blogs/open-source-intelligence/]]></link>
			<title>OPEN SOURCE INTELLIGENCE</title>
			<pubDate><![CDATA[Wed, 19 Jun 2024 04:12:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/blogs/blockchain-development/]]></guid>
			<link><![CDATA[https://hackarchive.in/blogs/blockchain-development/]]></link>
			<title>BLOCKCHAIN DEVELOPMENT</title>
			<pubDate><![CDATA[Wed, 03 Jul 2024 07:49:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/cia-triad/]]></guid>
			<link><![CDATA[https://hackarchive.in/cia-triad/]]></link>
			<title>The Hidden Trade-Off in the CIA Triad</title>
			<pubDate><![CDATA[Tue, 24 Mar 2026 10:45:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-2-state-channels/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-2-state-channels/]]></link>
			<title>PART 2 : STATE CHANNELS</title>
			<pubDate><![CDATA[Tue, 18 Jun 2024 16:31:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-1-introduction-to-layer-2/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-1-introduction-to-layer-2/]]></link>
			<title>PART 1 : INTRODUCTION TO LAYER 2</title>
			<pubDate><![CDATA[Tue, 18 Jun 2024 11:13:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-4-hash-locking/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-4-hash-locking/]]></link>
			<title>PART 4 : HASH LOCKING</title>
			<pubDate><![CDATA[Tue, 18 Jun 2024 11:06:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/part-5-side-chains-and-bridges/]]></guid>
			<link><![CDATA[https://hackarchive.in/part-5-side-chains-and-bridges/]]></link>
			<title>PART 5 : SIDE CHAINS AND BRIDGES</title>
			<pubDate><![CDATA[Sun, 07 Jul 2024 04:57:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://hackarchive.in/cybersec-fear/]]></guid>
			<link><![CDATA[https://hackarchive.in/cybersec-fear/]]></link>
			<title>The Cyber Security Industry Runs On Fear</title>
			<pubDate><![CDATA[Sat, 28 Mar 2026 07:03:47 +0000]]></pubDate>
		</item>
				</channel>
</rss>
