<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://daniyyell.com/malware%20analysis/Understanding-Fileless-Malware/</loc>
<lastmod>2024-08-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/malware%20analysis/analysing-obfuscated-javascript-strrat/</loc>
<lastmod>2024-10-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/malware%20analysis/analysing-obfuscated-vbs-remcos/</loc>
<lastmod>2024-10-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/threat%20hunting/tools/malware%20analysis/Utilising-Velociraptor-for-Effective-Malware-Detection-and-Response/</loc>
<lastmod>2024-10-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/threat%20hunting/tools/malware%20analysis/Analyzing-AsyncRAT-Infection-Traffic-with-SELKS/</loc>
<lastmod>2024-10-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/phishing/Analysing-a-Fake-Royal-Mail-Smishing-Attack-Hidden-Behind-Cloudflare/</loc>
<lastmod>2024-11-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/malware%20analysis/inside-zoom-invite-call-phishing-malware-distribution/</loc>
<lastmod>2024-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/threat%20hunting/tools/malware%20analysis/Using-Velociraptor-to-Detect-and-Hunt-for-Affected-Systems-Unknown-Malware-Analysis/</loc>
<lastmod>2025-02-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/threat%20hunting/tools/malware%20analysis/Threat-Hunting-on-Windows-Server-2016-Uncovering-Hidden-C2-Malware-Using-Elastic-SIEM/</loc>
<lastmod>2025-05-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/datasets/Memory-Forensics-Attack-Simulation-Dataset/</loc>
<lastmod>2025-07-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/malware%20analysis/Investigating-Suspicious-Memory-Activity-Tracing-A-SIEM-Alert-To-A-Cobalt-Strike-C2/</loc>
<lastmod>2025-07-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://daniyyell.com/categories/</loc>
</url>
<url>
<loc>https://daniyyell.com/</loc>
</url>
<url>
<loc>https://daniyyell.com/tags/</loc>
</url>
<url>
<loc>https://daniyyell.com/page2/</loc>
</url>
<url>
<loc>https://daniyyell.com/page3/</loc>
</url>
</urlset>
