A detailed exploration of the Windows Portable Executable (PE) format through hands-on reverse engineering. The author analyzes a .NET executable compiled with Mono, examining the DOS header, PE signature, COFF header, and section tables. The goal is to understand PE structure well enough to generate .NET executables directly

4h 6m watch time

Sort: