This document discusses techniques for obfuscating PDF malware to make analysis more difficult. It begins by explaining common obfuscation methods like malformed PDF structure, JavaScript splitting across objects, and eval chains. It then provides more advanced techniques like exploiting idiosyncrasies of the Adobe JavaScript engine, using difficult to emulate API functions, and cooperative multi-threading with message passing. The document aims to help malware authors create more stealthy and resistant obfuscation.