<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://black-rainbow.ai/pricing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/privacy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/reference</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/terms</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/cli-reference</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/getting-started/configuration</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/getting-started/installation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/getting-started/quickstart</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/integrations/claude-code</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/kill-chains/examples/ad-assessment</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/kill-chains/examples/ai-red-team</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/kill-chains/examples/web-app-assessment</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/kill-chains/overview</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/overview</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/plugins/overview</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/plugins/writing-custom</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/docs/reports/overview</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/adversarial-ml/data-attacks/data-poisoning</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/adversarial-ml/data-attacks/membership-inference</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/adversarial-ml/model-attacks/model-evasion</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/adversarial-ml/model-attacks/model-extraction</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/agent-mcp/agent-exploitation/a2a-protocol-exploitation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/agent-mcp/agent-exploitation/confused-deputy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/agent-mcp/agent-exploitation/react-loop-injection</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/agent-mcp/tool-supply-chain/mcp-tool-poisoning</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/agent-mcp/tool-supply-chain/rug-pull-attack</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/agent-mcp/tool-supply-chain/tool-shadowing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/active-probing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/adversarial-ml</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/agent--mcp</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/agent-exploitation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/artifact-attacks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/context-manipulation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/data--privacy</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/data-extraction</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/data-poisoning</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/delivery--encoding</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/direct-override</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/evasion</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/framework-reference</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/infrastructure</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/input-evasion</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/model-attacks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/organizational</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/output-evasion</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/passive-recon</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/prompt-injection</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/rag-attacks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/reconnaissance</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/service-exploitation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/threat-modeling</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/tool-supply-chain</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/tools--frameworks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/category/vulnerability-taxonomies</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/evasion/input-evasion/payload-splitting</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/evasion/input-evasion/token-boundary-exploitation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/evasion/input-evasion/unicode-homoglyph-evasion</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/evasion/output-evasion/output-filter-bypass</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/infrastructure/artifact-attacks/model-deserialization-rce</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/infrastructure/service-exploitation/model-server-exploitation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/infrastructure/service-exploitation/vector-database-attacks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/prompt-injection/context-manipulation/hypothetical-framing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/prompt-injection/context-manipulation/multi-turn-escalation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/prompt-injection/delivery/function-call-manipulation</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/prompt-injection/delivery/indirect-prompt-injection</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/prompt-injection/delivery/semantic-smuggling</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/prompt-injection/direct/direct-instruction-override</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/prompt-injection/direct/role-confusion-debug-mode</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/rag-attacks/extraction/context-window-overflow</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/rag-attacks/extraction/knowledge-base-exfiltration</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/rag-attacks/poisoning/embedding-collision</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/rag-attacks/poisoning/knowledge-base-poisoning</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/rag-attacks/poisoning/retrieval-hijacking</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/recon/active/api-endpoint-discovery</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/recon/active/guardrail-detection</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/recon/active/rag-pipeline-enumeration</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/recon/active/system-prompt-extraction</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/recon/active/tool-function-enumeration</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/recon/passive/dependency-analysis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/recon/passive/model-fingerprinting</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/recon/passive/monitoring-blind-spots</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/reference/organizational/google-saif</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/reference/threat-modeling/forge</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/reference/threat-modeling/mitre-atlas</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/reference/threat-modeling/nvidia-ai-kill-chain</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/reference/vulnerability-taxonomies/owasp-llm-top-10</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/reference/vulnerability-taxonomies/owasp-ml-top-10</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/tools/deepteam</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/tools/garak</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/tools/promptfoo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/techniques/tools/pyrit-microsoft</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://black-rainbow.ai/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>