A detailed exploration of the Windows Portable Executable (PE) format through hands-on reverse engineering. The author analyzes a .NET executable compiled with Mono, examining the DOS header, PE signature, COFF header, and section tables. The goal is to understand PE structure well enough to generate .NET executables directly
•4h 6m watch time
Sort: