Skip to content
logo
Defence blues
Introduction
  • Red wilds
  • Privacy greenhouse
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
      • Golem Trust Computing Ltd.
      • Department of Silent Stability
      • The Home for Bewildered Beasts of Legend
      • Stormforge
      • Blue team @SOC
      • Reverse engineering
        • Binary formats
          • Introduction
            • What?
            • Why?
            • How?
          • Anatomy of binaries
          • Executable and Linkable Format (ELF)
          • Portable Executable (PE) format
        • Cracking nuts
        • Malware analysis
        • THM Rooms
      • Steganography
      • Cryptanalysis
      • Blue team for dev
      • Blue team @Home
      • Bulletproofing servers
      • Honeytech for humans
    • What?
    • Why?
    • How?

    Introduction¶

    What?¶

    The anatomy of binary formats and the binary life cycle.

    Why?¶

    Machine code is fed to a computer’s processor in the form of binary files. These machine code files must target a specific computer platform, the combination of operating system and hardware architecture.

    How?¶

    • Anatomy of binaries

    • Executable and Linkable Format (ELF)

    • Portable Executable (PE) format

    2026-03-23 18:18
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7