<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://norfolkinfosec.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://norfolkinfosec.com/recent-lazarus-tools/</loc><lastmod>2019-01-13T22:00:21+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/a-lazarus-keylogger-pslogger/</loc><lastmod>2019-01-22T00:24:45+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/some-notes-on-the-silence-proxy/</loc><lastmod>2019-02-06T01:57:20+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/how-the-silence-downloader-has-evolved-over-time/</loc><lastmod>2019-02-11T16:31:10+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/how-to-analyzing-a-malicious-hangul-word-processor-document-from-a-dprk-threat-actor-group/</loc><lastmod>2019-02-25T05:45:48+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/jeshell-an-oceanlotus-apt32-backdoor/</loc><lastmod>2019-03-24T01:02:06+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/the-first-stage-of-shadowhammer/</loc><lastmod>2019-03-27T23:28:22+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/possible-shadowhammer-targeting-low-confidence/</loc><lastmod>2019-04-03T14:28:25+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/osint-reporting-on-dprk-and-ta505-overlap/</loc><lastmod>2019-04-10T23:18:33+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/filesnfer-tool-c-python/</loc><lastmod>2019-05-07T05:29:28+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/http-listener/</loc><lastmod>2019-07-19T17:30:13+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/emissary-panda-dll-backdoor/</loc><lastmod>2019-07-22T03:49:59+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/the-lazarus-injector/</loc><lastmod>2019-07-22T03:48:04+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/apt33-powershell-malware/</loc><lastmod>2019-07-22T05:34:37+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/another-lazarus-injector/</loc><lastmod>2019-10-21T03:08:35+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/pos-malware-used-at-fuel-pumps/</loc><lastmod>2019-12-23T14:13:54+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/fuel-pumps-ii-poslurp-b/</loc><lastmod>2019-12-31T17:40:35+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/a-new-look-at-old-dragonfly-malware-goodor/</loc><lastmod>2020-03-30T03:45:09+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/looking-back-at-liteduke/</loc><lastmod>2020-05-18T02:16:27+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/tinypos-and-prolocker-an-odd-relationship/</loc><lastmod>2020-11-02T03:34:50+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/dprk-malware-targeting-security-researchers/</loc><lastmod>2021-01-27T01:58:36+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/dprk-targeting-researchers-ii-sys-payload-and-registry-hunting/</loc><lastmod>2021-02-02T02:20:03+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/some-notes-on-virtualgate/</loc><lastmod>2022-10-03T05:57:36+00:00</lastmod></url><url><loc>https://norfolkinfosec.com/north-koreas-post-infection-python-payloads/</loc><lastmod>2024-04-03T21:01:14+00:00</lastmod></url></urlset>
