<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://dotphish.blog/posts/IcedID/</loc>
<lastmod>2024-07-15T10:26:43+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/posts/unauthentical/</loc>
<lastmod>2024-07-16T10:32:00+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/posts/ICMTC-Finals-CTF/</loc>
<lastmod>2024-08-02T12:30:43+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/posts/ASCWG-Reverse-Engineering/</loc>
<lastmod>2024-08-02T12:30:43+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/posts/ASCWG-Finals/</loc>
<lastmod>2024-09-25T16:11:43+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/posts/CyCTF-Finals/</loc>
<lastmod>2024-11-28T08:30:43+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/posts/My-0xL4ugh-CTF-Challenges/</loc>
<lastmod>2024-12-29T05:03:43+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/posts/Yaoguai-Aswan-CTF-Finals/</loc>
<lastmod>2026-04-26T01:17:19+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/posts/EGCERT-CTF-Qualifications/</loc>
<lastmod>2025-05-24T17:11:43+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/posts/My-CAT-CTF-25-Challenges/</loc>
<lastmod>2025-08-22T04:00:00+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/posts/My-0xL4ugh-2025-CTF-Challenges/</loc>
<lastmod>2026-01-27T13:19:00+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/categories/</loc>
<lastmod>2026-04-26T05:59:05+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/tags/</loc>
<lastmod>2026-04-26T05:59:05+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/archives/</loc>
<lastmod>2026-04-26T05:59:05+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/about/</loc>
<lastmod>2026-04-26T05:59:05+07:00</lastmod>
</url>
<url>
<loc>https://dotphish.blog/</loc>
</url>
<url>
<loc>https://dotphish.blog/tags/malware-analysis/</loc>
</url>
<url>
<loc>https://dotphish.blog/tags/cybersecurity/</loc>
</url>
<url>
<loc>https://dotphish.blog/tags/reverse-engineering/</loc>
</url>
<url>
<loc>https://dotphish.blog/tags/writeup/</loc>
</url>
<url>
<loc>https://dotphish.blog/tags/ctf/</loc>
</url>
<url>
<loc>https://dotphish.blog/tags/walkthrough/</loc>
</url>
<url>
<loc>https://dotphish.blog/tags/tutorial/</loc>
</url>
<url>
<loc>https://dotphish.blog/tags/game-hacking/</loc>
</url>
<url>
<loc>https://dotphish.blog/tags/research/</loc>
</url>
<url>
<loc>https://dotphish.blog/tags/arabic/</loc>
</url>
<url>
<loc>https://dotphish.blog/categories/malware-analysis/</loc>
</url>
<url>
<loc>https://dotphish.blog/categories/ctf/</loc>
</url>
<url>
<loc>https://dotphish.blog/categories/ctf-author/</loc>
</url>
<url>
<loc>https://dotphish.blog/categories/tutorials/</loc>
</url>
<url>
<loc>https://dotphish.blog/categories/research/</loc>
</url>
<url>
<loc>https://dotphish.blog/page2/</loc>
</url>
</urlset>
