<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Web on zx10r blog</title><link>https://portfolio.aimansam.my/blog/tags/web/</link><description>Recent content in Web on zx10r blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sat, 09 May 2026 11:10:00 +0800</lastBuildDate><atom:link href="https://portfolio.aimansam.my/blog/tags/web/index.xml" rel="self" type="application/rss+xml"/><item><title>Web Exploitation Workflow</title><link>https://portfolio.aimansam.my/blog/posts/web-exploitation-workflow/</link><pubDate>Sat, 09 May 2026 11:10:00 +0800</pubDate><guid>https://portfolio.aimansam.my/blog/posts/web-exploitation-workflow/</guid><description>A practical workflow I use for approaching web targets in labs and CTFs, from surface mapping to exploit validation.</description></item></channel></rss>