This paper explores the potential of executables for covert communication. Three techniques for the embedding of secret information are presented. Possible attacks on the stealthiness of these techniques are identified and countered. The presented concepts are implemented and evaluated for the IA-32 architecture, for which we obtain an encoding rate of 1/27 before countermeasures and 1/89 after countermeasures.