Welcome to The Malware Bible, brought to you by PCEF
LogoLogo
CtrlK
Course CertsAURADonate Now
  • The Indoctrination
    • The Beginning
      • Introduction to x86 Assembly
      • Introduction to Shellcode
      • Introduction to Python
      • Introduction to C
      • So You Want to Write Malware?
      • Introduction to Exploit Development
    • The Journey
      • Windows PE File Structure
      • ELF Structures
      • Android Package File Structure
      • iOS App Store File Structure
    • The Rituals
      • Start Writing Malware
      • Malware Obfuscation Techniques
      • Malware Evasion Techniques
    • The Scriptures
      • Yara Rules
      • Radare2
      • IDAPro
      • Evasion Tactics
      • WinDBG
      • WinAPI
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
Export as PDF
  1. The Indoctrination
  2. The Rituals

Start Writing Malware

Coming soon...

PreviousThe RitualsNextMalware Obfuscation Techniques

Last updated 26 days ago

Was this helpful?

Helpful Links

  • Source Code
  • License

© PCEF