<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Code Virtualizer on mondsekai's Blog</title><link>http://blog.noty.uno/tags/code-virtualizer/</link><description>Recent content in Code Virtualizer on mondsekai's Blog</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><copyright>Copyright © Mondsekai 2025</copyright><lastBuildDate>Thu, 27 Feb 2025 00:00:00 +0000</lastBuildDate><atom:link href="http://blog.noty.uno/tags/code-virtualizer/index.xml" rel="self" type="application/rss+xml"/><item><title>Code Virtualizer Problems</title><link>http://blog.noty.uno/posts/code-virtualizer-problems/</link><pubDate>Thu, 27 Feb 2025 00:00:00 +0000</pubDate><guid>http://blog.noty.uno/posts/code-virtualizer-problems/</guid><description>In this article, I will go through the virtual machine architecture issues that Code Virtualizer exposes that i have seen, show you different ways to attack a VM to extract important information for yourself, and show you how to apply this to different applications where different types of information are being checked.</description></item></channel></rss>