<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <!-- Core Pages -->
  <url><loc>https://pentestas.com/</loc><changefreq>weekly</changefreq><priority>1.0</priority></url>
  <url><loc>https://pentestas.com/services</loc><changefreq>weekly</changefreq><priority>0.9</priority></url>
  <url><loc>https://pentestas.com/penetration-testing</loc><changefreq>weekly</changefreq><priority>0.9</priority></url>
  <url><loc>https://pentestas.com/contact</loc><changefreq>monthly</changefreq><priority>0.7</priority></url>
  <url><loc>https://pentestas.com/about</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/success-stories</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/downloads</loc><changefreq>monthly</changefreq><priority>0.5</priority></url>

  <!-- Service Pages -->
  <url><loc>https://pentestas.com/services/api-penetration-testing</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://pentestas.com/services/web-penetration-testing</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://pentestas.com/services/saas-penetration-testing</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://pentestas.com/services/mobile-penetration-testing</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://pentestas.com/services/network-penetration-testing</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://pentestas.com/services/cloud-penetration-testing</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://pentestas.com/mobile-app-penetration-testing</loc><changefreq>monthly</changefreq><priority>0.8</priority></url>

  <!-- Blog -->
  <url><loc>https://pentestas.com/blog</loc><changefreq>weekly</changefreq><priority>0.7</priority></url>
  <url><loc>https://pentestas.com/blog/api-penetration-testing-complete-guide-rest-graphql-grpc</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/api-penetration-testing-cost-pricing-scope-what-to-expect</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/web-application-penetration-testing-what-why-how-to-get-started</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/web-application-penetration-testing-compliance-soc2-pci-dss-hipaa-iso27001</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/saas-penetration-testing-multi-tenant-platforms-specialized-security-testing</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/soc2-penetration-testing-saas-companies-requirements-process-pass-audit</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/mobile-app-penetration-testing-complete-guide-ios-android-security</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/choose-mobile-app-penetration-testing-company-10-questions-ask</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/network-penetration-testing-external-internal-active-directory-attack-simulation</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/network-penetration-testing-pci-dss-cmmc-compliance-requirements-best-practices</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/cloud-penetration-testing-secure-aws-azure-gcp-environments</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/cloud-penetration-testing-vs-cloud-security-assessment-which-do-you-need</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/supply-chain-attack-anatomy-npm-package-compromise</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/red-team-vs-penetration-test-what-your-company-actually-needs</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://pentestas.com/blog/zero-trust-architecture-implementation-lessons-from-the-field</loc><changefreq>monthly</changefreq><priority>0.6</priority></url>

  <!-- Legal -->
  <url><loc>https://pentestas.com/privacy-policy</loc><changefreq>yearly</changefreq><priority>0.3</priority></url>
  <url><loc>https://pentestas.com/terms-of-use</loc><changefreq>yearly</changefreq><priority>0.3</priority></url>
  <url><loc>https://pentestas.com/cookie-policy</loc><changefreq>yearly</changefreq><priority>0.3</priority></url>
</urlset>
