# af6897cafc3603a5642fa4c5a1170473

## [\[ Infocard \]](https://ghostinthehive.xyz/)&#x20;

Intentionally left blank for now

***

## &#x20;Almost Fully Documented Blogs:

* [Malware Evasion through Injection - part 1](https://ghostinthehive.gitbook.io/ghostinthehive-as-a-ghost-in-the-hive/windows-and-malware/windows-internals/malware-evasion-through-injection-pt1)
* [Malware Evasion through Injection - part 2](https://ghostinthehive.gitbook.io/ghostinthehive-as-a-ghost-in-the-hive/windows-and-malware/windows-internals/malware-evasion-through-injection-pt2)
* Reverse Engineering Section:
  * [Reverse Engineering Primer - part 1](https://ghostinthehive.gitbook.io/ghostinthehive-as-a-ghost-in-the-hive/reverse-engineering/reverse-engineering/disassemble-that-binary)
  * [Dissecting a PE File - part 1](https://ghostinthehive.gitbook.io/ghostinthehive-as-a-ghost-in-the-hive/reverse-engineering/reverse-engineering/dissecting-a-pe-file)
  * [Dissecting a PE File - part 2](https://ghostinthehive.gitbook.io/ghostinthehive-as-a-ghost-in-the-hive/reverse-engineering/reverse-engineering/dissecting-a-pe-file-format-data-directories-p1-imports-exports)
  * [Dissecting an ELF Binary - part 1](https://ghostinthehive.gitbook.io/ghostinthehive-as-a-ghost-in-the-hive/reverse-engineering/reverse-engineering/dissecting-an-elf-file)
* Malware Analysis Section
* [Linux Kernel Debugging](https://ghostinthehive.gitbook.io/ghostinthehive-as-a-ghost-in-the-hive/debugging-the-linux-kernel-with-qemu-and-gdb)
