Skip to content
logo
Red team
Introduction
  • Green team
  • Blue team
  • Purple team
  • Ty Myrddin
Initializing search
      • IN: Where the falcons and foxes roam
      • THROUGH: Where the raccoons burrow and rummage
        • The art of staying where you are not wanted
        • Where the raccoon overflows the bin—on purpose
        • Foraging for secrets in binaries
          • Binary formats
            • Introduction
              • What?
              • Why?
              • How?
            • Anatomy of binaries
            • Executable and Linkable Format (ELF)
            • Portable Executable (PE) format
          • Cracking nuts
          • Malware analysis
          • Reverse engineering training grounds
          • Malware traffic analysis exercises
          • theZoo - A Live Malware Repository
          • crackmes.one
        • The payload is in the picnic photo
        • Tipping the stack—and the garbage can
        • Nature’s cheats: The raccoon’s guide to slipping through the cracks
      • OUT: Where squirrels swipe the crown jewels
    • What?
    • Why?
    • How?

    Introduction¶

    What?¶

    The anatomy of binary formats and the binary life cycle.

    Why?¶

    Machine code is fed to a computer’s processor in the form of binary files. These machine code files must target a specific computer platform, the combination of operating system and hardware architecture.

    How?¶

    • Anatomy of binaries

    • Executable and Linkable Format (ELF)

    • Portable Executable (PE) format


    Last update: 2025-05-12 14:16
    Back to top
    Previous Binary formats
    Next Anatomy of binaries
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7