<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://synawk.com//blog/shellcode-x86-con-c-y-assembly</loc>
<lastmod>2021-05-12T09:39:30+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/writeup-bcactf-2-0</loc>
<lastmod>2021-06-13T19:18:29+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/syscalls-en-windows</loc>
<lastmod>2021-06-21T01:14:20+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/machine-learning-para-detectar-malware</loc>
<lastmod>2021-07-03T22:00:42+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/printnightmare-cve-2021-1675</loc>
<lastmod>2021-07-05T21:37:55+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/analisis-estatico-de-malware-y-como-hacer-bypass</loc>
<lastmod>2021-07-16T17:03:31+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/wannamine-de-ransomware-a-mineria-analisis-de-malware-0x1</loc>
<lastmod>2021-07-22T20:16:27+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/shazam-malware-dev-0x1</loc>
<lastmod>2021-08-10T00:34:40+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/golang-y-cgo-artemis-0x1</loc>
<lastmod>2021-08-15T21:03:29+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/malware-polimorfico-artemis-0x2</loc>
<lastmod>2021-08-17T19:20:32+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/phishing-como-saber-si-un-sitio-es-realmente-seguro</loc>
<lastmod>2021-08-20T13:30:15+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/sockets-y-comunicacion-http-malware-dev-0x2</loc>
<lastmod>2021-08-26T23:18:45+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/clonar-certificado-de-un-sitio-web-en-un-pefile</loc>
<lastmod>2021-09-02T12:34:32+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/escalar-privilegios-artemis-0x3</loc>
<lastmod>2021-10-06T00:59:39+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/feeling-lucky-bypassing-microsoft-defender-runtime-scanning</loc>
<lastmod>2021-10-06T11:17:55+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/another-amsi-bypass-runtime-scanning-ft-meterpreter</loc>
<lastmod>2021-11-01T09:06:22+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/improving-sql-injections</loc>
<lastmod>2023-07-06T00:32:19+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/junkshell-a-naive-approach-to-bypass-av-edr</loc>
<lastmod>2023-08-04T12:59:25+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/clop-cuando-menos-es-m%C3%A1s-an%C3%A1lisis-de-malware-0x2</loc>
<lastmod>2024-01-03T23:17:36+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/hilos-shazam-malware-dev-0x3</loc>
<lastmod>2024-01-08T19:28:14+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/masjesu-una-botnet-para-gobernarlos-a-todos-analisis-de-malware-0x3</loc>
<lastmod>2024-01-18T14:37:14+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/peb-obfuscation-malware-dev-0x4</loc>
<lastmod>2024-02-13T00:21:11+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/syscallme-another-techinque-to-resolve-syscall-id-ssn</loc>
<lastmod>2024-09-09T12:07:56+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/hunting-malware-on-arm-with-ai-approach</loc>
<lastmod>2024-12-23T12:10:11+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//blog/is-rust-a-good-language-to-make-malware</loc>
<lastmod>2025-11-01T13:55:27+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//about</loc>
</url>
<url>
<loc>https://synawk.com//blog</loc>
</url>
<url>
<loc>https://synawk.com//pages/contact</loc>
</url>
<url>
<loc>https://synawk.com//</loc>
</url>
<url>
<loc>https://synawk.com//admin/</loc>
<lastmod>2025-11-11T18:57:52+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//assets/Algorithms-Malware.pdf</loc>
<lastmod>2025-11-11T18:57:52+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//assets/DevFest%202024%20-%20Mauricio%20Jara%20-%20Anatomia%20de%20un%20Ransomware.pdf</loc>
<lastmod>2025-11-11T18:57:52+00:00</lastmod>
</url>
<url>
<loc>https://synawk.com//assets/Programacion%20orientada%20a%20hacking.pdf</loc>
<lastmod>2025-11-11T18:57:52+00:00</lastmod>
</url>
</urlset>
