<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.msreverseengineering.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-21</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2024/8/20/c-unwind-metadata-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/a9d49779-f58f-4605-8f0c-1e28a756a833/intro-xagent.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/530b6091-b764-4d87-9d23-41690ee88fe6/comrat-string-copy.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/3fe54cd1-cefb-4a4c-b71f-87d66c8b9cee/eh2-multicatch.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/76003231-26d4-4ea8-afd5-f8cac492cc90/func-with-chunks.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/d112e849-a5db-4d17-b86f-2014e6e3b51d/hr-wind-example-plain.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/0c8ec37a-f109-4af6-a811-c9c6908bc59c/hr-wind-example-right-clickj.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/4302a3c1-7571-4b04-ba0a-67a489084b8c/hr-wind-example-decomp.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/a9f6e83a-508b-4011-a0dc-2cf6773c2994/cr-ctor1.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/17212ee8-e00f-4e91-8413-5b6d7ca40142/cr-ctor2.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/67602e95-bed2-46f0-a56e-e7867876dcbf/cr-ctor3.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/9949e94e-c45a-494d-9eb7-295d107c9956/cr-ctor4.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/3bdf0fb0-bc58-4354-8b30-4121efca1015/cr-nested1.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/5dee7333-9a54-4294-a78f-b40f621ea8fa/cr-nested2.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/7b7fbd92-4690-4b28-bb1c-20cd5adb6488/cr-vtable1.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/30956f91-48a7-44cf-a73a-998ba01461be/cr-vtable2.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/234dcf67-acc3-4d1f-aba7-bc1323b5f8ab/cr-unwind-meh.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/f10c4395-c1b8-4f54-bf09-7a0685637cee/cr-unwind-alright.png</image:loc>
      <image:title>Blog - C++ Unwind Exception Metadata: A Hidden Reverse Engineering Bonanza - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2022/1/25/an-exhaustively-analyzed-idb-for-comlook</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2022-01-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/631bb955-0147-4203-9d35-336b8f256bf8/ComLook-folders.png</image:loc>
      <image:title>Blog - An Exhaustively Analyzed IDB for ComLook - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/a772f765-cafa-48ac-93fa-f38c862b4724/ComLook-debug-iterators.png</image:loc>
      <image:title>Blog - An Exhaustively Analyzed IDB for ComLook - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2021/9/21/automation-in-reverse-engineering-c-template-code</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-09-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252481851-6UAKUGDWIRG9IIIAN1VU/Example-Shuffle-C.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252562110-QFVPUFXJZ3MHXSHG38PA/AnimMacros1.gif</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252600437-X5R07RLGW923J1CDKTXE/AnimMacros2.gif</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252631789-3AN3WMIUED0XBE8NEOLU/AnimMacros3.gif</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252661956-8BMJ6BUIJ4UKILQ7KXWG/ShuffleHead.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252705741-L6DPYCT3ED1M7SMHSU83/ShuffleHeadBoth.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252740461-RLWXYKBTH7FPRZRC4DJI/ShuffleCharInt.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252781911-S6J4NS4QX5YYLKI68W9V/AnimMacroExpand.gif</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252884068-7YX8JCM3BXCQGKN7QGWR/ShuffleTemplate.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252944399-USIQ47ZMQTC0ZV83PSVN/DataStructMacroTemplate.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632252996209-YHX296Z69XFPUTNVOU2Q/VectorDecl.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632253033635-JYXR6ZZ47WFTRL79M8PN/VectorPointers.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632253069092-0L4AW8EZ5FL1GFJ6TQQB/VectorIntString.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632253153510-M3N1R9U6YP4KC6XHJYPD/ReVectorInt.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632258761132-1EH8STWXC9W7H9XI998Q/HRVectorBeforeAfter.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1632253306346-8PMA9SQX56BK6HS9611Z/ScriptVectorExample.png</image:loc>
      <image:title>Blog - Automation in Reverse Engineering C++ STL/Template Code - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2021/6/1/hex-rays-getprocaddress-and-malware-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-06-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1622591294913-ECKXWT79SLSJJ3Y4P68W/HR71.png</image:loc>
      <image:title>Blog - Hex-Rays, GetProcAddress, and Malware Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1622591347166-XGTP0AWV9QHDOWFUNB69/HR76.png</image:loc>
      <image:title>Blog - Hex-Rays, GetProcAddress, and Malware Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1622591586565-RRF2GE1J5AXZ9BGA3GUR/AnalysisWithCasts.png</image:loc>
      <image:title>Blog - Hex-Rays, GetProcAddress, and Malware Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1622592018876-M54KYI7EVS4Z5YDGX5FY/PyDemo.png</image:loc>
      <image:title>Blog - Hex-Rays, GetProcAddress, and Malware Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1622592053867-QVSG8K7LETOQZETV0YD0/ScriptOutput.png</image:loc>
      <image:title>Blog - Hex-Rays, GetProcAddress, and Malware Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1622661497790-TXHEY9941H697MPZ12MN/GUIMenu.png</image:loc>
      <image:title>Blog - Hex-Rays, GetProcAddress, and Malware Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1622661534792-7AL68IPVOL4TQ85S0331/GUIAsk.png</image:loc>
      <image:title>Blog - Hex-Rays, GetProcAddress, and Malware Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1622661585166-KFDPP3XKUPSI587CEAUS/GUIResult.png</image:loc>
      <image:title>Blog - Hex-Rays, GetProcAddress, and Malware Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1622592099614-6EBKFS88I6XNX1HTXXN2/ForceCallType.png</image:loc>
      <image:title>Blog - Hex-Rays, GetProcAddress, and Malware Analysis - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2021/3/3/what-is-a-while2-loop-in-hex-rays</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1614815319717-D85HI28B45S200VISPLM/while2.png</image:loc>
      <image:title>Blog - What is a while(2) loop in Hex-Rays?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2021/3/2/an-exhaustively-analyzed-idb-for-flawedgrace</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1614712048763-PUYUEV3SPYOQ0AALPDLC/AnalysisComparison.png</image:loc>
      <image:title>Blog - An Exhaustively-Analyzed IDB for FlawedGrace</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1614712191344-FYZBMPPTTKXFYFNAV1J6/Functions.png</image:loc>
      <image:title>Blog - An Exhaustively-Analyzed IDB for FlawedGrace</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1614712228087-F6BN6M60R08QK5CUTFAS/LocalTypes.png</image:loc>
      <image:title>Blog - An Exhaustively-Analyzed IDB for FlawedGrace</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2020/8/31/an-exhaustively-analyzed-idb-for-comrat-v4</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-09-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1598940218026-FY0ADHHKQCZR79BCS9MS/Analysis-Side-By-Side.png</image:loc>
      <image:title>Blog - An Exhaustively-Analyzed IDB for ComRAT v4</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1598940250618-HE8A2YBLUAUTL7GENZWP/Folders-Side-By-Side.png</image:loc>
      <image:title>Blog - An Exhaustively-Analyzed IDB for ComRAT v4</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2020/5/7/a-compiler-optimization-involving-speculative-execution-of-function-pointers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-05-08</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2019/8/5/automation-techniques-in-c-reverse-engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-06</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2019/4/17/an-abstract-interpretation-based-deobfuscation-plugin-for-ghidra</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-04-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536425143-9JG83BOQFLA9XZ4I9P55/HeaderImg.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536474919-DLZG5FAUVXW51OTOIJ7N/ObfTFAnnotated.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536517926-19IB6M5ZX3A79DVGE3KK/3VLAnd2.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536553028-9QF13R6O357YUEV1ZYCM/3VLAnd3.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536571594-J0BYO0570N5KDZSW00TT/3VL-LargerTable.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536587625-4JQFM93SU0W4DZ4ZOC48/3VL-Add2.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536604215-PIPU74G2ZTTATUAAN1XV/3VL-Add3.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536636320-5RAFNSLDKQKKD012WN3J/GhidraX86EnablePcodeProcedure.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536663020-5H2M90WG94WVMX5VRC17/GhidraX86PcodeEnabled.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536719715-S1ZB1F69W9N2D3FS2DQP/GhidraImportMenu.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536741715-6VS17Y6H96X61VFS5KXI/Ghidra3VLSelectLanguage.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536767374-4LPTUB70D1AU9HNYMQHS/GhidraAutoAnalyze.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536787555-EFX4EMJUC63VC1C183DS/Ghidra3VLScriptOutput.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536834638-UFVX7MG31T8WJHXHF90R/ARMObfAnnotated.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536853781-5E0KO2CQP0M5UNG8AG7L/ARMHRFailure.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536896828-QZ7YLZC99Y9C46GP34JN/GhirdaImportARM.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536914756-LOYX3LOT49EWQEFERMB5/ARMAnalysisResolvedBranchComments.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536937085-4BQ7IQ9ECMT3325EQ4CH/ARMAnalysisValuesOutput.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555536958798-6VZB8M5EMYA82VEQA2E8/ARMAnalysisValuesOutputCropped.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555537005283-K3DY7A7GMXLCLA8MFMUM/ARMAnalysisPcodeOutputCropped.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555537023914-T2727U2X0ECH4DQTUHDX/ARMAnalysisPcodeOutput.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555537068307-OE61X5HU29CYH7V2AJD8/VMIDAOpaque.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555537101367-54LDXRQVS6P3KMEAZ39J/VMGhidraGraphColored.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555537136035-U3JRV5XTLOLFHM3M1ZKE/VMPF.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555537156545-HC8Q5GQ88Z4JPE4ZSYLQ/VMPFNoModel.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555537186415-U8PJLZLW945BOA1VGFRR/ExistingIaSinc.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555537205947-PT03U00TH6GQ14PZDS5D/VMPFModel.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1555537234684-F3FYKKOJVF2VL8JS61GH/VMGhidraFalseNegative.png</image:loc>
      <image:title>Blog - An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2019/1/22/removing-an-annoying-compiler-optimization-with-a-hex-rays-microcode-plugin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-01-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1548196137396-0CUAMROK0QA352QAEYRJ/ASM-unoptimized-impl.png</image:loc>
      <image:title>Blog - Removing an Annoying Compiler Optimization with a Hex-Rays Microcode Plugin</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1548196202717-SX4R0F35108F7CDQ07U3/ASM-optimized-impl.png</image:loc>
      <image:title>Blog - Removing an Annoying Compiler Optimization with a Hex-Rays Microcode Plugin</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1548196233043-94LKJWR3J0EF2AW91BVK/decomp-no-NOT.png</image:loc>
      <image:title>Blog - Removing an Annoying Compiler Optimization with a Hex-Rays Microcode Plugin</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1548196243902-CVK90O6F32MP5U0NKMT5/decomp-NOT.png</image:loc>
      <image:title>Blog - Removing an Annoying Compiler Optimization with a Hex-Rays Microcode Plugin</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1548196263261-NW7P8OEY4VENHN8H7FCL/decomp-altered-no-NOT.png</image:loc>
      <image:title>Blog - Removing an Annoying Compiler Optimization with a Hex-Rays Microcode Plugin</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1548196276849-3LFNQP1EOSGQM3LPKMIH/decomp-altered-NOT.png</image:loc>
      <image:title>Blog - Removing an Annoying Compiler Optimization with a Hex-Rays Microcode Plugin</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1548196292954-Q2OHZW6OJBNB80S7DHKN/decomp-enum.png</image:loc>
      <image:title>Blog - Removing an Annoying Compiler Optimization with a Hex-Rays Microcode Plugin</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2019/1/14/a-quick-solution-to-an-ugly-reverse-engineering-problem</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-01-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1547498741507-9R05MOAFLZLFCE25XLLZ/ManyStackWrites.png</image:loc>
      <image:title>Blog - A Quick Solution to an Ugly Reverse Engineering Problem</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1547498823800-9PW61DK2IRSP7F7APHDO/HR-ManyStackVariables.png</image:loc>
      <image:title>Blog - A Quick Solution to an Ugly Reverse Engineering Problem</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1547498845852-KY75CKSB1IHFB9W8QUEO/HR-ManyStackWrites.png</image:loc>
      <image:title>Blog - A Quick Solution to an Ugly Reverse Engineering Problem</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1547498908998-XIDP3KTU9R9FLV61H68Y/HR-DecompilerOptions.png</image:loc>
      <image:title>Blog - A Quick Solution to an Ugly Reverse Engineering Problem</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1547499046561-KRFY6EZECF56OKCYG046/PythonCleanedUp.png</image:loc>
      <image:title>Blog - A Quick Solution to an Ugly Reverse Engineering Problem</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1547499085704-FPLVZP0Y00UPFT8IKDRI/PythonSaveBinary.png</image:loc>
      <image:title>Blog - A Quick Solution to an Ugly Reverse Engineering Problem</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1547499140177-XSLU21206FT1L8UUXETZ/IDA-AssembleCommand.png</image:loc>
      <image:title>Blog - A Quick Solution to an Ugly Reverse Engineering Problem</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1547499184170-K3B84OVBQSWWZ64IK7MN/Patched.png</image:loc>
      <image:title>Blog - A Quick Solution to an Ugly Reverse Engineering Problem</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1547499316642-TABQU2SSVGD3BOIPSSZ7/IDC.png</image:loc>
      <image:title>Blog - A Quick Solution to an Ugly Reverse Engineering Problem</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1547499356025-F3Z3HBD1LWTV9ACTPJ0P/IDA-NavBarAfter.png</image:loc>
      <image:title>Blog - A Quick Solution to an Ugly Reverse Engineering Problem</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/10/9/hex-rays-ctree-api-scripting-automated-contextual-function-renaming</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-10-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1539139759098-2RO1SZ23WJ0WM8OIF6O6/HexDsp.png</image:loc>
      <image:title>Blog - Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1539139786267-VNBWA6R9FS6UPZZZQB0Q/TextSearch.png</image:loc>
      <image:title>Blog - Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1539139807220-9SX5Z09ST6LFNVZRL06K/FilteredSearch.png</image:loc>
      <image:title>Blog - Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1539139834179-XBYN141KNFQLRLJRUWJ6/hexcall_t_C.png</image:loc>
      <image:title>Blog - Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1539139856925-KQW2Z3PB08J2SK9EU16Y/ParseCHeaderFile.png</image:loc>
      <image:title>Blog - Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1539139875391-NMUXAWP3CSBOUS0REC34/LoadEnum.png</image:loc>
      <image:title>Blog - Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1539139901878-16HNBIWJP7EDXVQ5TKYM/HRApplyEnum.png</image:loc>
      <image:title>Blog - Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1539139926799-QIHAVOAMM251DR7NEFOK/HREnumApplied.png</image:loc>
      <image:title>Blog - Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1539139947584-MQ685MFVOVBSKM622DFM/SwitchPrettyNames.png</image:loc>
      <image:title>Blog - Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1539139972823-J8DT84KILCOVFNGTJ6OX/DecompRenamed.png</image:loc>
      <image:title>Blog - Hex-Rays CTREE API Scripting: Automated Contextual Function Renaming</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/9/19/hex-rays-microcode-api-vs-obfuscating-compiler</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-09-19</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/9/2/weekend-project-a-custom-ida-loader-module-for-the-hidden-bee-malware-family</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-09-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1535930250175-ZMIM5IH6PWQDL759D0VN/LoaderScreen.png</image:loc>
      <image:title>Blog - Weekend Project: A Custom IDA Loader Module for the Hidden Bee Malware Family</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1535930318142-QBMM6UVN9M0MA55X7SAJ/ImportNames.png</image:loc>
      <image:title>Blog - Weekend Project: A Custom IDA Loader Module for the Hidden Bee Malware Family</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1535930378327-FVT7Z2APB9NYJHT9QA2N/RebaseBefore.png</image:loc>
      <image:title>Blog - Weekend Project: A Custom IDA Loader Module for the Hidden Bee Malware Family</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1535930406102-B10P7BVHCYXIMWQ7BFIF/RebaseAfter.png</image:loc>
      <image:title>Blog - Weekend Project: A Custom IDA Loader Module for the Hidden Bee Malware Family</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/7/24/the-atredis-blackhat-2018-ctf-challenge</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532466840508-LNB7V5EYPCO8E5XVE96U/AtredisChall.jpg</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532466870815-ZK41VTZDR2Q8YHAGATDF/AtredisMail.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532466911599-GUJ6YVFN2Q6FAFXYPEH6/Strings.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532466942613-QVI6820IGR37Z3MTCB00/68000-gibberish-disasm.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532466968253-ENSVHF6SJ43BOEG21SJ8/M6502-legit-looking-disasm.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532466990972-HR6BU0HBS0HOXKMK4LCC/LoadAsM6502.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532467019598-HZ751AY20NMXWUS8E6I3/LoadConfig.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532467044848-K7GFUYJS36R5AY3EOBX7/LoadBinaryFile.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532467104588-DDAK10LR9TF8V1QG30DX/LoadBinaryFileConfig.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532467133550-CN61HK6J63ARBR8Y6WCR/Bootloc.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532467181815-AY7T145A6C0ZCY2HBFLE/AutoComments.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532467209320-JLMV9ZVWP8E4BJQMQOUF/AutoCommentsDisasm.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532467234083-S3ANCNPDLN9ZHYYIO7AA/StringRefsDisasmCode.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532467262034-G5UTOPCMK6STH1XDGZ17/DisasmStrings.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1532467280691-JQELBQZH76N4RZ8VG23R/CallImpl.png</image:loc>
      <image:title>Blog - The Atredis BlackHat 2018 CTF Challenge</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/2/26/concrete-and-abstract-interpretation-explained-through-chess</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1519710476495-MGS0OS0UOY0BSR0M2RYK/ai-lobster.png</image:loc>
      <image:title>Blog - Concrete and Abstract Interpretation, Explained through Chess</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/2/21/devirtualizing-finspy-phase-4-second-attempt-at-devirtualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1519244087499-LMQA7VBAOF8OMZNBDCDW/take2NavBar.png</image:loc>
      <image:title>Blog - FinSpy VM Unpacking Tutorial Part 3: Devirtualization. Phase #4: Second Attempt at Devirtualization</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1519244122129-WZRO6EMG4ZNEH7WEXR62/take2NavBar-2.png</image:loc>
      <image:title>Blog - FinSpy VM Unpacking Tutorial Part 3: Devirtualization. Phase #4: Second Attempt at Devirtualization</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1519244158397-OHIEATB7J5FWE8ZP5U2A/noReferenceNoPrologue.png</image:loc>
      <image:title>Blog - FinSpy VM Unpacking Tutorial Part 3: Devirtualization. Phase #4: Second Attempt at Devirtualization</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1519244181629-E1RZITMEL1DEPR4Y7AIH/nonResolvedCallTargets.png</image:loc>
      <image:title>Blog - FinSpy VM Unpacking Tutorial Part 3: Devirtualization. Phase #4: Second Attempt at Devirtualization</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/2/21/devirtualizing-finspy-phase-3-fixing-the-function-related-issues</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-16</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/2/21/devirtualizing-finspy-phase-2-first-attempt-at-devirtualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1519242903869-5C9TZ0DUQZ0S1R80FSXT/brokenStack.png</image:loc>
      <image:title>Blog - FinSpy VM Unpacking Tutorial Part 3: Devirtualization. Phase #2: First Attempt at Devirtualization</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/2/21/wsbjxrs1jjw7qi4trk9t3qy6hr7dye</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/2/21/finspy-vm-unpacking-tutorial-part-3-devirtualization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-02</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/1/31/finspy-vm-part-2-vm-analysis-and-bytecode-disassembly</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-02</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1517469834782-JK7EEAXDMSM4TPXUH90O/VMArch.png</image:loc>
      <image:title>Blog - FinSpy VM Part 2: VM Analysis and Bytecode Disassembly</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2018/1/23/a-walk-through-tutorial-with-code-on-statically-unpacking-the-finspy-vm-part-one-x86-deobfuscation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1516700526477-G9PT8HVXB3WRKWHTKVXA/NavBar-Original.png</image:loc>
      <image:title>Blog - A Walk-Through Tutorial, with Code, on Statically Unpacking the FinSpy VM: Part One, x86 Deobfuscation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1516700684850-VM6U3DOLF0A7OF1Z1DBB/NavBar-Middle.png</image:loc>
      <image:title>Blog - A Walk-Through Tutorial, with Code, on Statically Unpacking the FinSpy VM: Part One, x86 Deobfuscation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1516700702586-FFMANA0CTXRBWJXEWFJ1/Graph.png</image:loc>
      <image:title>Blog - A Walk-Through Tutorial, with Code, on Statically Unpacking the FinSpy VM: Part One, x86 Deobfuscation</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1516700870885-28DL5BE0YB1R1VZS6S5B/NavBar-Final.png</image:loc>
      <image:title>Blog - A Walk-Through Tutorial, with Code, on Statically Unpacking the FinSpy VM: Part One, x86 Deobfuscation</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2017/7/15/the-synesthesia-shellcode-generator-code-release-and-future-directions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-07-18</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2016/11/8/synesthesia-modern-shellcode-synthesis-ekoparty-2016-talk</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-01-07</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2015/7/30/smt-based-binary-program-analysis-course-sample-x86-assemblydisassembly</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-05-08</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2015/7/16/hacking-renovo</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-07-17</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2015/6/29/transparent-deobfuscation-with-ida-processor-module-extensions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-06-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1435613168611-XBGETNOX4B0UFBBTFMKO/image-asset.png</image:loc>
      <image:title>Blog - Transparent Deobfuscation with IDA Processor Module Extensions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1435613210424-WTU2NSNQREBWBF6RJAU8/image-asset.png</image:loc>
      <image:title>Blog - Transparent Deobfuscation with IDA Processor Module Extensions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/8/4/a-static-malware-analysis-trick-three-byte-detours</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-06-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1407174218964-NS2DLOV41QIXA1OT0S8Q/image-asset.png</image:loc>
      <image:title>Blog - Detours into Arcana:  A Static Malware Analysis Trick</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1407174246073-T8P4DF3JPIRO3EBLIZ90/image-asset.png</image:loc>
      <image:title>Blog - Detours into Arcana:  A Static Malware Analysis Trick</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2015/6/9/x86-trivia-for-nerds</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-06-11</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/12/12/program-synthesis-in-reverse-engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-03-22</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/what-is-dll-injection-and-how-is-it-used-for-reverse-engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-12-09</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/how-do-i-move-from-rce-being-a-hobby-to-rce-being-a-profession</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/why-are-machine-code-decompilers-less-capable-than-for-example-those-for-the-clr-and-jvm</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/extracting-bits-with-a-single-multiplication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2015-07-19</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/smt-solvers-for-software-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/video-of-my-recon-2012-keynote-the-case-for-semantics-based-methods-in-reverse-engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-11-12</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/recon-2012-keynote-the-case-for-semantics-based-methods-in-reverse-engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-09-17</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/program-analysis-reading-list</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/automated-key-generator-generation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/finding-bugs-in-vms-with-a-theorem-prover</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/24/take-two-software-updates-and-see-me-in-the-morning-the-case-for-software-security-evaluations-of-medical-devices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/control-flow-deobfuscation-via-abstract-interpretation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1403555599729-QVOG04ZRZEOVS370X2XR/image-asset.png</image:loc>
      <image:title>Blog - Control Flow Deobfuscation via Abstract Interpretation</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/patchdiff2-analysis-and-decompilation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/compiler-optimizations-for-reverse-engineers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/c-subset-compiler-in-ocaml</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/unpacking-virtualization-obfuscators</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/zf0qs7jhiebprn2j5o6estux4g0jy9</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/switch-as-binary-search-part-0</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2023-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/baglew-thorough-idb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/vmprotect-part-3-optimization-and-code-generation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-06</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/vmprotect-part-2-primer-on-optimization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-06</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/1v20av0uhf5kygyyaprvj2i6u5ze2a</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-06</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/vmprotect-part-0-basics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-06</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/compiler-1-x86-virtualizer-0</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/industrial-grade-binary-only-profiling-and-coverage</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/code-generation-quirk-involving-array-indexing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/compiler-optimizations-regarding-structures</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/7ygw1ihlgipux6pj0jg4ag2qlogmdw</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/commwarriorb-thorough-idb-armc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-09</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/t2-2006-virtual-machine-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/22/procdump-162-thorough-idb</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/22/idas-ids-files</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-22</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/22/shellcode-analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-07-18</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/8/5/defeating-hyperunpackme2-with-an-ida-processor-module</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-08-05</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/graph-based-comparison-of-executable-objects</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2014-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/2014/6/23/compare-port-navigate</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-05-30</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/deobfuscation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/malware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/shellcode</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/ocaml</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/ida</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/reverse-engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/reverse+engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/processor+module</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/automation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/academic</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/program+analysis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/virtual+machines</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/blog/tag/smt</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/research</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-09-04</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/training</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-31</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2018-08-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5052176b84aeb45fa5cfcc83/1349577199654-C8A6HP2M4MLEBJXQ06MF/wilderness.png</image:loc>
      <image:title>Home - Transient</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/program-analysis-reading-list</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/program-analysis-training</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-06-01</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-04-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5052176b84aeb45fa5cfcc83/1349817862394-TX3STM31V0TM7UILO6ID/1349812992530.png</image:loc>
      <image:title>Contact - Transient</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/training-classes</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-22</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1474321201197-QXW07FNGYOQK88U8E4QV/RECourseGfx.png</image:loc>
      <image:title>Training Classes</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1474321646439-5D7NR8ZUAUUVJ10VZ13Q/SMTCourseGfx.png</image:loc>
      <image:title>Training Classes</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/9f4f4ef4-5dd0-4eaf-b7de-b549aa4f819b/cpp.png</image:loc>
      <image:title>Training Classes - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/training-registration-form</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-04-30</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/binary-literacy-2</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/about-montauk</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-05-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5052176b84aeb45fa5cfcc83/1350441759922-NKU5OB8ZIW62XB889M04/boatmen.png</image:loc>
      <image:title>About - Transient</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5052176b84aeb45fa5cfcc83/1350441775225-IJMQT4K4Z48MQNA4OKX4/ships.jpeg</image:loc>
      <image:title>About</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/purchase-training</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-01-04</lastmod>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/purchase-training/binary-literacy-static-reverse-engineering</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1483488120618-V0M9T5ZT55GIB1AS4X8O/RECourseGfx.png</image:loc>
      <image:title>Purchase Training - Binary Literacy: Static Reverse Engineering</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/purchase-training/kxk0eox2jeg501dk9ba1ybod2jt0xw</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-02-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/53a64cc2e4b0c63fc41a3320/1483487816538-X8ZNE286JOLVMONTUFVC/SMTCourseGfx.png</image:loc>
      <image:title>Purchase Training - SMT-Based Binary Program Analysis From the Ground Up</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.msreverseengineering.com/purchase-training-binary-literacy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-01-04</lastmod>
  </url>
</urlset>

