Malware Bible
  • The Indoctrination
    • The Beginning
      • Introduction to x86 Assembly
      • Introduction to Shellcode
      • Introduction to Python
      • Introduction to C
      • So You Want to Write Malware?
      • Introduction to Exploit Development
    • The Journey
      • Windows PE File Structure
      • ELF Structures
      • Android Package File Structure
      • iOS App Store File Structure
    • The Rituals
      • Start Writing Malware
      • Malware Obfuscation Techniques
      • Malware Evasion Techniques
    • The Scriptures
      • Yara Rules
      • Malcore
      • Radare2
      • IDAPro
      • Evasion Tactics
      • WinDBG
      • WinAPI
Powered by GitBook
On this page
  1. The Indoctrination

The Journey

PreviousIntroduction to Exploit DevelopmentNextWindows PE File Structure

Last updated 6 months ago

Behold, these are the courses of the malicious intents that will enter the network cloaked while carrying their payloads

Windows PE File Structure
ELF PE Structures
Android Package File Structure
iOS App Store File Structure