<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.zellic.io</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/services</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/our-work</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/team</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/contact</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/installation-complete</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/algebraic-attacks-on-zk-hash-functions</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/announcing-smart-contract-fiesta</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/ante-x-zellic</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/audit-drift</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/binance-bridge-hack-in-laymans-terms</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/breaking-down-the-economics-of-defi-hacks</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/browsing-for-bugs-3m-bug-in-premia-finance</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/cairo-security-primer</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/can-gpt-audit-smart-contracts</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/csprngs-how-to-properly-generate-random-numbers</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/erc-4337-primer</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/eth2-proof-of-stake-developer-guide</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/euler-finance-exploit-analysis</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/exploring-cosmos-a-security-primer</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/exploring-erc-4626</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/formal-verification-weth</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/how-does-tornado-cash-work</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/how-not-to-create-a-cdp-or-lending-protocol</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/how-to-create-an-ethereum-ctf-challenge</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/intro-to-zk-part-1</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/intro-to-zk-part-2</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/move-fast-and-break-things-pt-1</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/move-fast-break-things-move-security-part-2</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/safemoon-exploit-explained</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/the-auditooor-grindset</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/the-billion-dollar-move-bug</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/the-vulnerabilities-youll-write-with-anchor</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/top-10-aptos-move-bugs</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/your-sandwich-is-my-lunch-how-to-drain-mev-contracts-v2</loc>
    </url>
    <url>
        <loc>https://www.zellic.io/blog/zk-friendly-hash-functions</loc>
    </url>
</urlset>