<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://www.sohrabvakharia.in/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/publications/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/faciliator/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/videos/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/students-and-learning/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/books-for-knowledge/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/t-y-b-sc-i-t-network-security-practicals-2014-2015/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/m-sc-i-t-part-2-ethical-hacking-practicals/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/projects/mvlujProject1/WebPages/Index.html</loc>
  <lastmod>2015-07-26T15:52:33+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-1acaesar-cipher/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-1bmodified-caesar-cipher/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-1c-monoalphabetic-cipher/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-1c-polyalphabetic-cipher/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-2a-railfence-technique/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-2-a-b-simple-and-multiple-columnar/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-2d-vernam-cipher/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-3-diffie-hellman-key-exchange-algorithm/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-4-data-encryption-standard/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-5-advanced-encryption-standard/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-6-rsa-algorithm/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-7-rc4-algorithm/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-8-blowfish/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-1-whois-traceroute-email-tracking-and-google-hacking/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/practical-2-scanning-networkip-fragmentation-ssl-proxy-censorship-circumvention/</loc>
  <lastmod>2021-05-09T04:53:48+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/projects/mvlujProject1/WebPages/About%20Us.html</loc>
  <lastmod>2015-07-26T15:52:29+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/projects/mvlujProject1/WebPages/Blogs.html</loc>
  <lastmod>2015-07-26T15:52:31+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/projects/mvlujProject1/WebPages/Contact%20Us.html</loc>
  <lastmod>2015-07-26T15:52:32+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/EH/CEHPractical1.pdf</loc>
  <lastmod>2014-09-27T17:49:20+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/EH/UsingZenmap-MultipleIPScan.pdf</loc>
  <lastmod>2014-09-30T16:31:39+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/EH/UsingZenmap-SingleIPScan.pdf</loc>
  <lastmod>2014-09-30T16:31:51+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/EH/UsingAngryIPScanner.pdf</loc>
  <lastmod>2014-09-30T16:31:31+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/EH/UsingTorBrowser.pdf</loc>
  <lastmod>2014-09-30T16:31:26+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.sohrabvakharia.in/EH/SSLProxy.pdf</loc>
  <lastmod>2014-09-30T16:31:15+00:00</lastmod>
  <priority>0.41</priority>
</url>


</urlset>