<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">

  <!-- Página principal -->
  <url>
    <loc>https://blumesec.com/</loc>
    <lastmod>2026-04-05</lastmod>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
  </url>

  <!-- Guías -->
  <url>
    <loc>https://blumesec.com/guias</loc>
    <lastmod>2026-04-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
  </url>

  <!-- Laboratorios -->
  <url>
    <loc>https://blumesec.com/laboratorios</loc>
    <lastmod>2026-04-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
  </url>

  <!-- Herramientas & Payloads -->
  <url>
    <loc>https://blumesec.com/herramientas</loc>
    <lastmod>2026-04-05</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>

  <!-- Contacto / Redes -->
  <url>
    <loc>https://blumesec.com/contacto</loc>
    <lastmod>2026-04-05</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>

  <!-- Términos y condiciones -->
  <url>
    <loc>https://blumesec.com/terminos</loc>
    <lastmod>2026-04-05</lastmod>
    <changefreq>yearly</changefreq>
    <priority>0.3</priority>
  </url>

  <!-- Blog -->
  <url>
    <loc>https://blumesec.com/blog</loc>
    <lastmod>2026-04-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
  </url>

  <!-- Blog: Artículos -->
  <url><loc>https://blumesec.com/blog/como-empezar-en-ciberseguridad</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/fundamentos-de-ciberseguridad</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/introduccion-a-redes-informaticas</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/crear-entorno-seguro-hacking</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-vpn-gestor-contrasenas</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/certificaciones-ciberseguridad</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-osint-como-funciona</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/como-ser-anonimo-en-internet</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-son-metadatos-como-eliminarlos</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-phishing-como-detectarlo</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-ataque-baiting</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-usb-rubber-ducky</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-criptografia</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-ofuscacion-de-codigo</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/como-hacer-auditoria-wifi</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-auditoria-web</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/analisis-de-vulnerabilidades</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/como-analizar-incidentes-ciberseguridad</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-estudiar-ciberseguridad</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-un-pentester</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/errores-tipicos-hacking-etico</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/mejores-herramientas-osint</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-un-keylogger</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://blumesec.com/blog/que-es-ingenieria-social</loc><lastmod>2026-04-20</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>

</urlset>
