<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://www.amenaza.com/</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.amenaza.com/attack-tree-what-are.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/attack-tree-origins.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/attack-tree-grc.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/attack-tree-tool.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/threat-risk-capabilities-based.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-analysis.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/step-by-step-guide.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/Attack-Tree-Threat-Risk-Analysis.pdf</loc>
  <lastmod>2024-06-03T22:17:06+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/SecurITree%20and%20Random%20Events.pdf</loc>
  <lastmod>2023-10-19T17:12:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-main.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-what-is.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-who-uses.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-machine-learning.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-advantage.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-supply-chain-risks.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-screenshots.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-tutorial.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-software.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-sensitive-environments.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/eula.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/request_support.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/faq.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/request_trial.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/videos.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/saying.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/examples.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/documents.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/company.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/contact.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/request-web-demo.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/securitree-tour.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/Advantages%20of%20System%20Level%20Threat%20Modeling.pdf</loc>
  <lastmod>2023-12-20T20:20:43+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/attack-tree-pspm.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/request_presentation.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/TAG_Amenaza_Special_Edition_2023.pdf</loc>
  <lastmod>2023-08-17T19:03:52+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/privacy.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.amenaza.com/request_methodology.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/attack-tree.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/s1.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/s2.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/s3.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/s4.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/s5.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/s6.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/s7.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/s8.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/s9.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/s10.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/Tutorial.pdf</loc>
  <lastmod>2006-08-23T21:00:40+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/Validation_Z1557965.pdf</loc>
  <lastmod>2018-03-01T20:28:52+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/verify-5.6b008-nl.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/verify-5.6b008-l.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/system-requirements.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/demos/introduction-to-securitree.html</loc>
  <lastmod>2024-08-18T18:20:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/demos/introduction-to-pruning.html</loc>
  <lastmod>2024-08-18T18:20:21+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/demos/advanced-analysis.html</loc>
  <lastmod>2024-08-18T18:20:32+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/demos/case-study-burgle-house.html</loc>
  <lastmod>2024-08-18T18:20:40+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/Attack-Defense%20Trees%20in%20SecurITree.pdf</loc>
  <lastmod>2020-10-20T20:47:40+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/SecurITree.pdf</loc>
  <lastmod>2023-10-25T21:46:40+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/Pamphlet_Amenaza.pdf</loc>
  <lastmod>2021-04-27T07:48:31+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/SCMagazine20-Nov2009-Amenaza.pdf</loc>
  <lastmod>2009-12-14T23:57:55+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/SCMagazineReview-Feb2007-SecurITree.pdf</loc>
  <lastmod>2007-02-20T02:28:15+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/Hostile%20Risk%20Decisions.pdf</loc>
  <lastmod>2005-08-23T21:38:40+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/archives.php</loc>
  <lastmod>2025-01-21T22:21:01+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/QuickTour.pdf</loc>
  <lastmod>2005-08-23T21:38:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/Methodology.pdf</loc>
  <lastmod>2005-08-23T21:38:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/AttackTreeValue_WP.pdf</loc>
  <lastmod>2005-08-23T21:38:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/5StepAttackTree_WP.pdf</loc>
  <lastmod>2005-08-23T21:38:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/HIPAA_WP.pdf</loc>
  <lastmod>2005-08-23T21:38:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/RiskyBusiness_WP.pdf</loc>
  <lastmod>2005-08-23T21:38:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/PABSecurITree_WP.pdf</loc>
  <lastmod>2005-08-23T21:38:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/ICE_Risktrees.pdf</loc>
  <lastmod>2005-08-23T21:38:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/COSTO_Attacktrees.pdf</loc>
  <lastmod>2005-08-23T21:38:40+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.amenaza.com/downloads/docs/ATL-SecurITree.pdf</loc>
  <lastmod>2007-05-04T18:10:26+00:00</lastmod>
  <priority>0.51</priority>
</url>


</urlset>