Welcome to The Malware Bible, brought to you by PCEF
LogoLogo
CtrlK
Course CertsAURADonate Now
  • The Indoctrination
    • The Beginning
      • Introduction to x86 Assembly
      • Introduction to Shellcode
      • Introduction to Python
      • Introduction to C
      • So You Want to Write Malware?
      • Introduction to Exploit Development
    • The Journey
      • Windows PE File Structure
      • ELF Structures
      • Android Package File Structure
      • iOS App Store File Structure
    • The Rituals
      • Start Writing Malware
      • Malware Obfuscation Techniques
      • Malware Evasion Techniques
    • The Scriptures
      • Yara Rules
      • Radare2
      • IDAPro
      • Evasion Tactics
      • WinDBG
      • WinAPI
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
Export as PDF
  1. The Indoctrination

The Journey

Behold, these are the courses of the malicious intents that will enter the network cloaked while carrying their payloads

  • Windows PE File Structure

  • ELF PE Structures

  • Android Package File Structure

  • iOS App Store File Structure

PreviousIntroduction to Exploit DevelopmentNextWindows PE File Structure

Last updated 27 days ago

Was this helpful?

Helpful Links

  • Source Code
  • License

© PCEF