<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://Viuleeenz.github.io/posts/2025/12/reversing-android-native-libraries-coper/</loc><lastmod>2025-12-23T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2025/08/from-one-to-many-one-ioc-to-hunt-them-all/</loc><lastmod>2025-08-28T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2024/12/symbolic-execution-for-fun-and-flare-on/</loc><lastmod>2024-12-27T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2024/05/emulating-inline-decryption-for-triaging-c-malware/</loc><lastmod>2024-05-16T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2024/03/understanding-api-hashing-and-build-a-rainbow-table-for-lummastealer/</loc><lastmod>2024-03-24T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2024/02/understanding-peb-and-ldr-structures-using-ida-and-lummastealer/</loc><lastmod>2024-02-04T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2023/12/applied-emulation-decrypting-ursnif-strings-with-unicorn/</loc><lastmod>2023-12-20T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2023/11/applied-emulation-analysis-of-marsstealer/</loc><lastmod>2023-11-15T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2023/10/vidar-payload-inspection-with-static-analysis/</loc><lastmod>2023-10-25T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2023/08/agent-tesla-building-an-effective-decryptor/</loc><lastmod>2023-08-29T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2023/06/ida-python-locate-a-function-independently-from-its-offset/</loc><lastmod>2023-06-27T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2023/05/extracting-ddosia-targets-from-process-memory/</loc><lastmod>2023-05-08T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2023/03/dynamic-binary-instrumentation-for-malware-analysis/</loc><lastmod>2023-03-14T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/2021/09/manually-unpacking-of-packed-executable/</loc><lastmod>2021-09-02T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/posts/</loc><lastmod>2025-12-23T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/</loc><lastmod>2025-12-23T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/whitepapers/</loc><lastmod>2025-10-22T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/series/</loc><lastmod>2021-09-02T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/series/unpacking-executables-1/</loc><lastmod>2021-09-02T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/about/</loc><lastmod>2021-09-01T00:00:00+00:00</lastmod></url><url><loc>https://Viuleeenz.github.io/authors/</loc></url><url><loc>https://Viuleeenz.github.io/categories/</loc></url><url><loc>https://Viuleeenz.github.io/tags/</loc></url></urlset>