<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.irregular.com/</loc></url>
<url><loc>https://www.irregular.com/publications</loc></url>
<url><loc>https://www.irregular.com/careers</loc></url>
<url><loc>https://www.irregular.com/about</loc></url>
<url><loc>https://www.irregular.com/contact</loc></url>
<url><loc>https://www.irregular.com/privacy-policy</loc></url>
<url><loc>https://www.irregular.com/publications/emergent-offensive-cyber-behavior-in-ai-agents</loc></url>
<url><loc>https://www.irregular.com/publications/assessing-gpt-5.4-thinking-against-offensive-security-benchmarks</loc></url>
<url><loc>https://www.irregular.com/publications/cyber-capabilities-exceed-standard-evaluation-budgets</loc></url>
<url><loc>https://www.irregular.com/publications/test-post-for-testing</loc></url>
<url><loc>https://www.irregular.com/publications/offense-at-scale-how-frontier-ai-lowers-the-cost-of-cyber-attacks</loc></url>
<url><loc>https://www.irregular.com/publications/introducing-solve-plus</loc></url>
<url><loc>https://www.irregular.com/publications/framework-for-cyber-refusal-policies-in-llm-agents</loc></url>
<url><loc>https://www.irregular.com/publications/proportionality-in-ai-risk-evaluations</loc></url>
<url><loc>https://www.irregular.com/publications/vibe-password-generation</loc></url>
<url><loc>https://www.irregular.com/publications/model-evaluation-gpt-5.3-codex-on-offensive-security-benchmarks</loc></url>
<url><loc>https://www.irregular.com/publications/agentic-internet-trust-problem</loc></url>
<url><loc>https://www.irregular.com/publications/testing-ai-agents-on-web-security-challenges</loc></url>
<url><loc>https://www.irregular.com/publications/model-evaluation-gpt-5.2-codex-on-offensive-security-benchmarks</loc></url>
<url><loc>https://www.irregular.com/publications/expected-cost-per-success</loc></url>
<url><loc>https://www.irregular.com/publications/spell-bound-technical-case-study</loc></url>
<url><loc>https://www.irregular.com/publications/emerging-evidence-of-a-capability-shift</loc></url>
<url><loc>https://www.irregular.com/publications/cyscenariobench</loc></url>
<url><loc>https://www.irregular.com/publications/a-frontier-fortnight</loc></url>
<url><loc>https://www.irregular.com/publications/the-rise-of-autonomous-vulnerability-research-capabilities</loc></url>
<url><loc>https://www.irregular.com/publications/next-generation-of-cyber-evals</loc></url>
<url><loc>https://www.irregular.com/publications/from-ai-assisted-to-ai-orchestrated</loc></url>
<url><loc>https://www.irregular.com/publications/claude-sonnet-4-5-cybersecurity-capabilities-evaluation</loc></url>
<url><loc>https://www.irregular.com/publications/introducing-frontier-ai-security</loc></url>
<url><loc>https://www.irregular.com/publications/evaluating-gpt-5</loc></url>
<url><loc>https://www.irregular.com/publications/from-scripts-to-strategy-claude-4s-advanced-approach-to-offensive-security</loc></url>
<url><loc>https://www.irregular.com/publications/confidential-inference-systems</loc></url>
<url><loc>https://www.irregular.com/publications/irregular-cybersecurity-talk-at-ai-evaluations-session-of-euc-ai-office</loc></url>
<url><loc>https://www.irregular.com/publications/openais-o3-and-o4-mini-security-evaluation</loc></url>
<url><loc>https://www.irregular.com/publications/bluehat-security-conference-2025</loc></url>
<url><loc>https://www.irregular.com/publications/deriving-capability-levels-from-evaluation-results</loc></url>
<url><loc>https://www.irregular.com/publications/ai-evaluation-platform-cyber-use-case</loc></url>
<url><loc>https://www.irregular.com/publications/claude-3-7-sonnet-evaluation</loc></url>
<url><loc>https://www.irregular.com/publications/refusal-policy-for-ai-systems-in-cybersecurity</loc></url>
<url><loc>https://www.irregular.com/publications/paris-ai-security-forum-25-keynote</loc></url>
<url><loc>https://www.irregular.com/publications/introducing-solve</loc></url>
<url><loc>https://www.irregular.com/publications/faisc-2024</loc></url>
<url><loc>https://www.irregular.com/publications/best-practices-for-evaluations-and-evaluation-suites-part-3</loc></url>
<url><loc>https://www.irregular.com/publications/best-practices-for-evaluations-and-evaluation-suites-part-2</loc></url>
<url><loc>https://www.irregular.com/publications/best-practices-for-evaluations-and-evaluation-suites-part-1</loc></url>
<url><loc>https://www.irregular.com/publications/cyber-capabilities-analysis</loc></url>
<url><loc>https://www.irregular.com/publications/cyber-capabilities-analysis-1.0</loc></url>
<url><loc>https://www.irregular.com/publications/irregular-featured-in-forbes</loc></url>
<url><loc>https://www.irregular.com/publications/securing-ai-model-weights</loc></url>
<url><loc>https://www.irregular.com/publications/bluehat-2024</loc></url>
<url><loc>https://www.irregular.com/publications/threat-models</loc></url>
<url><loc>https://www.irregular.com/publications/llm-specific-attacks-framework</loc></url>
</urlset>