<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://threatblogger.com/snowman/</loc><lastmod>2025-12-06T13:14:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatblogger.com/about/</loc><lastmod>2025-12-06T13:13:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatblogger.com/2023/07/11/reversing-c-decompiled-code/</loc><lastmod>2025-12-06T12:51:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/08/07/analysis-of-wi-fi-spreading-worm/</loc><lastmod>2025-12-06T12:34:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/06/27/reversing-c-assembly-code/</loc><lastmod>2025-07-10T20:40:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/06/25/reversing-a-simple-c-program/</loc><lastmod>2025-07-10T20:34:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/07/13/ccleaner-reversing-the-v5-33-malicious-binary/</loc><image:image><image:loc>https://threatblogger.com/wp-content/uploads/2023/07/screenshot_20230714-013934_samsunginternet_resized28129.jpg</image:loc><image:title>Screenshot_20230714-013934_Samsung Internet_resized (1)</image:title></image:image><lastmod>2025-07-05T16:20:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/07/19/patching-an-executable-in-x64dbg/</loc><lastmod>2025-07-05T16:20:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/07/07/inline-assembly/</loc><lastmod>2025-07-05T16:02:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/06/24/analysis-of-how-a-buffer-overflow/</loc><lastmod>2025-07-05T15:09:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/06/10/welcome/</loc><lastmod>2025-07-05T14:08:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/07/29/dissecting-shellcode/</loc><lastmod>2025-07-05T13:56:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/06/27/zero-day-exploits/</loc><image:image><image:loc>https://threatblogger.com/wp-content/uploads/2023/06/pexels-photo-3861969.jpeg</image:loc><image:title>code projected over woman</image:title><image:caption>Photo by ThisIsEngineering on &lt;a href="https://www.pexels.com/photo/code-projected-over-woman-3861969/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2025-07-05T13:03:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2025/06/03/process-hollowing/</loc><lastmod>2025-07-05T12:55:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2024/02/27/x64dbg-snowman-decompiler/</loc><lastmod>2024-12-21T15:16:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2024/01/30/reversing-with-ida-pro-and-ghidra/</loc><image:image><image:loc>https://threatblogger.com/wp-content/uploads/2024/01/ida-pro1-1.jpg</image:loc><image:title>ida-pro1</image:title></image:image><lastmod>2024-01-30T17:48:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/contact/</loc><lastmod>2023-12-23T11:40:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatblogger.com/2023/06/23/tools-of-the-trade/</loc><lastmod>2023-09-23T14:23:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/06/26/unp/</loc><lastmod>2023-09-23T14:23:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/2023/07/07/packers-unpacking/</loc><lastmod>2023-09-23T14:22:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatblogger.com/blog/</loc><lastmod>2023-07-01T12:29:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatblogger.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-12-06T13:14:12+00:00</lastmod></url></urlset>
