logo
Red team
Binary formats
  • Green team
  • Blue team
  • Purple team
  • Indigo team
  • Broomstick Brief
  • Ty Myrddin
Initializing search
      • IN: Where the falcons and foxes roam
      • THROUGH: Where the raccoons burrow and rummage
        • The art of staying where you are not wanted
        • Where the raccoon overflows the bin—on purpose
        • Foraging for secrets in binaries
          • Binary formats
            • Introduction
            • Anatomy of binaries
            • Executable and Linkable Format (ELF)
            • Portable Executable (PE) format
          • Binary formats
            • Introduction
            • Anatomy of binaries
            • Executable and Linkable Format (ELF)
            • Portable Executable (PE) format
          • Cracking nuts
          • Malware analysis
          • Reverse engineering training grounds
          • Malware traffic analysis exercises
          • theZoo - A Live Malware Repository
          • crackmes.one
        • The payload is in the picnic photo
        • Tipping the stack—and the garbage can
        • Nature’s cheats: The raccoon’s guide to slipping through the cracks
      • OUT: Where squirrels swipe the crown jewels

    Binary formats¶

    Machine code is fed to a computer’s processor in the form of binary files. These machine code files must target a specific computer platform, the combination of operating system and hardware architecture.

    The anatomy of binary formats and the binary life cycle.

    • Introduction
    • Anatomy of binaries
    • Executable and Linkable Format (ELF)
    • Portable Executable (PE) format

    Last update: 2025-05-19 17:27
    Back to top
    Previous Foraging for secrets in binaries
    Next Introduction
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7