# Code & Process Injection

- [CreateRemoteThread Shellcode Injection](/offensive-security/code-injection-process-injection/process-injection.md): Injecting shellcode into a local process.
- [DLL Injection](/offensive-security/code-injection-process-injection/dll-injection.md): Injecting DLL into a remote process.
- [Reflective DLL Injection](/offensive-security/code-injection-process-injection/reflective-dll-injection.md): Loading DLL from memory
- [Shellcode Reflective DLL Injection](/offensive-security/code-injection-process-injection/reflective-shellcode-dll-injection.md)
- [Process Doppelganging](/offensive-security/code-injection-process-injection/process-doppelganging.md)
- [Loading and Executing Shellcode From PE Resources](/offensive-security/code-injection-process-injection/loading-and-executing-shellcode-from-portable-executable-resources.md)
- [Process Hollowing and Portable Executable Relocations](/offensive-security/code-injection-process-injection/process-hollowing-and-pe-image-relocations.md): Code injection, evasion
- [APC Queue Code Injection](/offensive-security/code-injection-process-injection/apc-queue-code-injection.md)
- [Early Bird APC Queue Code Injection](/offensive-security/code-injection-process-injection/early-bird-apc-queue-code-injection.md)
- [Shellcode Execution in a Local Process with QueueUserAPC and NtTestAlert](/offensive-security/code-injection-process-injection/shellcode-execution-in-a-local-process-with-queueuserapc-and-nttestalert.md)
- [Shellcode Execution through Fibers](/offensive-security/code-injection-process-injection/executing-shellcode-with-createfiber.md)
- [Shellcode Execution via CreateThreadpoolWait](/offensive-security/code-injection-process-injection/shellcode-execution-via-createthreadpoolwait.md)
- [Local Shellcode Execution without Windows APIs](/offensive-security/code-injection-process-injection/local-shellcode-execution-without-windows-apis.md)
- [Injecting to Remote Process via Thread Hijacking](/offensive-security/code-injection-process-injection/injecting-to-remote-process-via-thread-hijacking.md)
- [SetWindowHookEx Code Injection](/offensive-security/code-injection-process-injection/setwindowhookex-code-injection.md)
- [Finding Kernel32 Base and Function Addresses in Shellcode](/offensive-security/code-injection-process-injection/finding-kernel32-base-and-function-addresses-in-shellcode.md)
- [Executing Shellcode with Inline Assembly in C/C++](/offensive-security/code-injection-process-injection/executing-shellcode-with-inline-assembly-in-c-c++.md)
- [Writing Custom Shellcode Encoders and Decoders](/offensive-security/code-injection-process-injection/writing-custom-shellcode-encoders-and-decoders.md)
- [Backdooring PE Files with Shellcode](/offensive-security/code-injection-process-injection/backdooring-portable-executables-pe-with-shellcode.md)
- [NtCreateSection + NtMapViewOfSection Code Injection](/offensive-security/code-injection-process-injection/ntcreatesection-+-ntmapviewofsection-code-injection.md)
- [AddressOfEntryPoint Code Injection without VirtualAllocEx RWX](/offensive-security/code-injection-process-injection/addressofentrypoint-code-injection-without-virtualallocex-rwx.md): Code Injection
- [Module Stomping for Shellcode Injection](/offensive-security/code-injection-process-injection/modulestomping-dll-hollowing-shellcode-injection.md): Code Injection
- [PE Injection: Executing PEs inside Remote Processes](/offensive-security/code-injection-process-injection/pe-injection-executing-pes-inside-remote-processes.md): Code Injection
- [API Monitoring and Hooking for Offensive Tooling](/offensive-security/code-injection-process-injection/api-monitoring-and-hooking-for-offensive-tooling.md)
- [Windows API Hooking](/offensive-security/code-injection-process-injection/how-to-hook-windows-api-using-c++.md)
- [Import Adress Table (IAT) Hooking](/offensive-security/code-injection-process-injection/import-adress-table-iat-hooking.md)
- [DLL Injection via a Custom .NET Garbage Collector](/offensive-security/code-injection-process-injection/injecting-dll-via-custom-.net-garbage-collector-environment-variable-complus_gcname.md)
- [Writing and Compiling Shellcode in C](/offensive-security/code-injection-process-injection/writing-and-compiling-shellcode-in-c.md)
- [Injecting .NET Assembly to an Unmanaged Process](/offensive-security/code-injection-process-injection/injecting-and-executing-.net-assemblies-to-unmanaged-process.md)
- [Binary Exploitation](/offensive-security/code-injection-process-injection/binary-exploitation.md)
- [32-bit Stack-based Buffer Overflow](/offensive-security/code-injection-process-injection/binary-exploitation/stack-based-buffer-overflow.md)
- [64-bit Stack-based Buffer Overflow](/offensive-security/code-injection-process-injection/binary-exploitation/64-bit-stack-based-buffer-overflow.md)
- [Return-to-libc / ret2libc](/offensive-security/code-injection-process-injection/binary-exploitation/return-to-libc-ret2libc.md)
- [ROP Chaining: Return Oriented Programming](/offensive-security/code-injection-process-injection/binary-exploitation/rop-chaining-return-oriented-programming.md)
- [SEH Based Buffer Overflow](/offensive-security/code-injection-process-injection/binary-exploitation/seh-based-buffer-overflow.md)
- [Format String Bug](/offensive-security/code-injection-process-injection/binary-exploitation/format-string-bug.md)
