These pages describes various file formats that can be (and have been) abused to deliver malware or to gain initial access.

For each format, attack techniques and obfuscation techniques are described, and references to relevant articles and tools are provided.