<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  
  <url>
    <loc>https://julian-wolf.eu/blog/</loc>
    <lastmod>2024-01-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/categories/</loc>
    <lastmod>2024-01-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/</loc>
    <lastmod>2024-01-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/tags/malware/</loc>
    <lastmod>2024-01-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/categories/malware/</loc>
    <lastmod>2024-01-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/tags/</loc>
    <lastmod>2024-01-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/tags/zero2auto/</loc>
    <lastmod>2024-01-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/2024/01/05/zero2auto-custom-sample/</loc>
    <lastmod>2024-01-05T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/2023/07/25/redline-stealer-unpacking-and-config-extraction/</loc>
    <lastmod>2023-07-25T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/2023/07/18/course-review-for710-reverse-engineering-malware-advanced-code-analysis/</loc>
    <lastmod>2023-07-18T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/2022/06/17/oski-stealer-unpacking-and-string-decryption/</loc>
    <lastmod>2022-06-17T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/tags/forensics/</loc>
    <lastmod>2021-04-01T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/categories/forensics/</loc>
    <lastmod>2021-04-01T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/2021/04/01/in-search-of-lost-data-a-study-of-flash-sanitization-practices/</loc>
    <lastmod>2021-04-01T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/2020/04/01/tampering-with-digital-evidence-is-hard-the-case-of-main-memory-images/</loc>
    <lastmod>2020-04-01T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/2019/12/09/enhancing-malware-analysis-through-automated-functionality-extraction/</loc>
    <lastmod>2019-12-09T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/about/</loc>
    <lastmod>2018-03-07T19:54:35+01:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/2018/03/07/ransomware-detection/</loc>
    <lastmod>2018-03-07T00:00:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://julian-wolf.eu/doc/en/ransomware_detection.pdf</loc>
    <lastmod>2019-12-09T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>

  <url>
    <loc>https://julian-wolf.eu/doc/en/malware_analysis_functionality_extraction.pdf</loc>
    <lastmod>2019-12-09T00:00:00+00:00</lastmod>
    <priority>0</priority>
  </url>


</urlset>

