<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://mandarnaik016.in/blog/2023-06-17-ultimate-guide-to-block-ads/</loc>
<lastmod>2023-06-17T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2023-06-24-compression-the-long-way/</loc>
<lastmod>2023-06-24T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2024-03-24-antivirus-evasion-using-xor-encryption/</loc>
<lastmod>2024-03-24T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2024-03-29-antivirus-evasion-using-divide-and-xor/</loc>
<lastmod>2024-03-29T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2024-06-09-malware-analysis-amsi-bypass/</loc>
<lastmod>2024-06-09T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2024-09-07-malware-analysis-kms/</loc>
<lastmod>2024-09-07T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2024-09-21-malware-analysis-pxrecvoweiwoei/</loc>
<lastmod>2024-09-21T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2024-10-05-malware-analysis-lumma-stealer/</loc>
<lastmod>2024-10-05T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2024-10-19-malware-analysis-rozena/</loc>
<lastmod>2024-10-19T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2024-11-02-malware-analysis-lnk/</loc>
<lastmod>2024-11-02T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2024-11-23-antivirus-evasion-msi-abuse/</loc>
<lastmod>2024-11-23T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2025-09-13-malware-analysis-svg-abuse/</loc>
<lastmod>2025-09-13T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2025-10-21-malware-analysis-vip-keylogger/</loc>
<lastmod>2025-10-21T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2025-10-25-malware-analysis-vip-keylogger-part2/</loc>
<lastmod>2025-10-25T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2026-01-24-traffic-analysis-it-is-a-trap/</loc>
<lastmod>2026-01-24T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/2026-02-22-machine-learning-predicting-cyber-attacks/</loc>
<lastmod>2026-02-22T00:00:00+05:30</lastmod>
</url>
<url>
<loc>https://mandarnaik016.in/blog/aboutme/</loc>
</url>
<url>
<loc>https://mandarnaik016.in/blog/gpg/</loc>
</url>
<url>
<loc>https://mandarnaik016.in/blog/</loc>
</url>
<url>
<loc>https://mandarnaik016.in/blog/tags/</loc>
</url>
<url>
<loc>https://mandarnaik016.in/blog/page2/</loc>
</url>
<url>
<loc>https://mandarnaik016.in/blog/page3/</loc>
</url>
<url>
<loc>https://mandarnaik016.in/blog/page4/</loc>
</url>
</urlset>
