logo
Red team
Binary formats
  • Green team
  • Blue team
  • Purple team
  • Indigo team
  • Contact
Initializing search
      • IN: Where the falcons and foxes roam
      • THROUGH: Where the raccoons burrow and rummage
        • The art of staying where you are not wanted
        • Where the raccoon overflows the bin—on purpose
        • Foraging for secrets in binaries
          • Binary formats
            • Introduction
            • Anatomy of binaries
            • Executable and Linkable Format (ELF)
            • Portable Executable (PE) format
          • Binary formats
            • Introduction
            • Anatomy of binaries
            • Executable and Linkable Format (ELF)
            • Portable Executable (PE) format
          • Cracking nuts
          • Malware analysis
          • Reverse engineering training grounds
        • The payload is in the picnic photo
        • Tipping the stack—and the garbage can
        • Nature’s cheats: The raccoon’s guide to slipping through the cracks
      • OUT: Where squirrels swipe the crown jewels
      • Myrddin’s Menagerie

    Binary formats¶

    Machine code is fed to a computer’s processor in the form of binary files. These machine code files must target a specific computer platform, the combination of operating system and hardware architecture.

    The anatomy of binary formats and the binary life cycle.

    • Introduction
    • Anatomy of binaries
    • Executable and Linkable Format (ELF)
    • Portable Executable (PE) format
    2025-08-26 20:50
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7