<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://vvelitkn.com/ctf%20writeups/Deathnote-CTF-Writeup/</loc>
<lastmod>2022-06-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/ctf%20writeups/Moneybox-CTF-Writeup/</loc>
<lastmod>2022-06-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/ctf%20writeups/Pickle-Rick-TryHackMe-CTF-Writeup/</loc>
<lastmod>2022-06-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/binary%20exploitation/Buffer-Overflow-Protection-Stack-Canary/</loc>
<lastmod>2022-08-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/binary%20exploitation/Dear-QA-TryHackMe-CTF-Writeup/</loc>
<lastmod>2022-08-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/binary%20exploitation/Pwn101-TryHackMe-CTF-Writeup/</loc>
<lastmod>2022-08-30T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/reverse%20engineering/Ramada-CTF-writeup/</loc>
<lastmod>2022-09-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/reverse%20engineering/Rangoon-CTF-Writeup/</loc>
<lastmod>2022-09-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/malware%20analysis/About-Command-and-Control-Server-(C2)/</loc>
<lastmod>2022-10-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/malware%20analysis/Bumblebee-Malware-Analysis-Part-1/</loc>
<lastmod>2022-11-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/malware%20analysis/What-is-DLL-Injection/</loc>
<lastmod>2022-11-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/malware%20analysis/Why-attackers-particularly-use-DLLs/</loc>
<lastmod>2022-11-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/malware%20analysis/Malware-Development-DLL-Injection/</loc>
<lastmod>2022-12-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/malware%20analysis/Importance-of-Automated-Malware-Analysis/</loc>
<lastmod>2022-12-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/malware%20analysis/Malware-Development-DLL-Sideloading/</loc>
<lastmod>2022-12-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/binary%20exploitation/Pt_Load-Injection/</loc>
<lastmod>2022-12-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/malware%20analysis/Escape-From-Evasion-Dominating-Windows-Functions-with-Detour/</loc>
<lastmod>2023-02-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/malware%20analysis/The-Illusion-of-Cybersecurity-Promised-Protection-Delivered-Disaster-Oh-Boy-1/</loc>
<lastmod>2025-01-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://vvelitkn.com/categories/</loc>
</url>
<url>
<loc>https://vvelitkn.com/</loc>
</url>
<url>
<loc>https://vvelitkn.com/tags/</loc>
</url>
<url>
<loc>https://vvelitkn.com/page2/</loc>
</url>
<url>
<loc>https://vvelitkn.com/page3/</loc>
</url>
<url>
<loc>https://vvelitkn.com/google78a2da9ae4ca367d.html</loc>
<lastmod>2025-01-30T12:52:14+00:00</lastmod>
</url>
</urlset>
