Welcome to The Malware Bible, brought to you by PCEF
LogoLogo
CtrlK
Course CertsAURADonate Now
  • The Indoctrination
    • The Beginning
      • Introduction to x86 Assembly
      • Introduction to Shellcode
      • Introduction to Python
      • Introduction to C
      • So You Want to Write Malware?
      • Introduction to Exploit Development
    • The Journey
      • Windows PE File Structure
      • ELF Structures
      • Android Package File Structure
      • iOS App Store File Structure
    • The Rituals
      • Start Writing Malware
      • Malware Obfuscation Techniques
      • Malware Evasion Techniques
    • The Scriptures
      • Yara Rules
      • Radare2
      • IDAPro
      • Evasion Tactics
      • WinDBG
      • WinAPI
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
Export as PDF
  1. The Indoctrination

The Rituals

And the Master of malware called to the architect and spoke from the core of the network, saying ...

  • Start Writing Malware

  • Malware Obfuscation Techniques

  • Malware Evasion Techniques

PreviousiOS App Store File StructureNextStart Writing Malware

Last updated 27 days ago

Was this helpful?

Helpful Links

  • Source Code
  • License

© PCEF