<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://threatunpacked.com/2026/03/12/building-a-scalable-windows-driver-vulnerability-analyzer-part-3-from-one-driver-to-1775/</loc><lastmod>2026-03-11T21:16:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatunpacked.com/2026/02/04/building-a-scalable-windows-driver-vulnerability-analyzer-part-2/</loc><image:image><image:loc>https://threatunpacked.com/wp-content/uploads/2026/02/scooby_unmasking_book_meme_1770145298563-1.jpg</image:loc><image:title>scooby_unmasking_book_meme_1770145298563</image:title></image:image><image:image><image:loc>https://threatunpacked.com/wp-content/uploads/2026/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-03T20:13:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatunpacked.com/2026/01/21/building-a-scalable-windows-driver-vulnerability-analyzer-part-1/</loc><lastmod>2026-01-22T15:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatunpacked.com/about/</loc><lastmod>2026-01-20T14:02:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatunpacked.com/2026/01/07/why-this-blog-exists/</loc><lastmod>2026-01-07T14:31:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatunpacked.com/featured-investigations/</loc><lastmod>2026-01-07T14:20:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://threatunpacked.com/2025/10/07/reversing-a-microsoft-signed-rootkit-the-netfilter-driver/</loc><image:image><image:loc>https://threatunpacked.com/wp-content/uploads/2025/10/2_netfilter_coverpage.png</image:loc><image:title>2_netfilter_coverpage</image:title></image:image><image:image><image:loc>https://threatunpacked.com/wp-content/uploads/2025/10/2_netfilter_filterworkerthread.png</image:loc><image:title>2_netfilter_filterworkerthread</image:title></image:image><image:image><image:loc>https://threatunpacked.com/wp-content/uploads/2025/10/2_netfilter_setupnetworkfilter.png</image:loc><image:title>2_netfilter_setupnetworkfilter</image:title></image:image><image:image><image:loc>https://threatunpacked.com/wp-content/uploads/2025/10/2_netfilter_initializefallback.png</image:loc><image:title>2_netfilter_initializefallback</image:title></image:image><image:image><image:loc>https://threatunpacked.com/wp-content/uploads/2025/10/2_netfilter_imports.png</image:loc><image:title>2_netfilter_imports</image:title></image:image><image:image><image:loc>https://threatunpacked.com/wp-content/uploads/2025/10/2_netfilter_driverentry.png</image:loc><image:title>2_netfilter_driverentry</image:title></image:image><lastmod>2025-10-07T00:14:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://threatunpacked.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-03-11T21:16:29+00:00</lastmod></url></urlset>
