Code & Process Injection

CreateRemoteThread Shellcode Injectionchevron-rightDLL Injectionchevron-rightReflective DLL Injectionchevron-rightShellcode Reflective DLL Injectionchevron-rightProcess Doppelgangingchevron-rightLoading and Executing Shellcode From PE Resourceschevron-rightProcess Hollowing and Portable Executable Relocationschevron-rightAPC Queue Code Injectionchevron-rightEarly Bird APC Queue Code Injectionchevron-rightShellcode Execution in a Local Process with QueueUserAPC and NtTestAlertchevron-rightShellcode Execution through Fiberschevron-rightShellcode Execution via CreateThreadpoolWaitchevron-rightLocal Shellcode Execution without Windows APIschevron-rightInjecting to Remote Process via Thread Hijackingchevron-rightSetWindowHookEx Code Injectionchevron-rightFinding Kernel32 Base and Function Addresses in Shellcodechevron-rightExecuting Shellcode with Inline Assembly in C/C++chevron-rightWriting Custom Shellcode Encoders and Decoderschevron-rightBackdooring PE Files with Shellcodechevron-rightNtCreateSection + NtMapViewOfSection Code Injectionchevron-rightAddressOfEntryPoint Code Injection without VirtualAllocEx RWXchevron-rightModule Stomping for Shellcode Injectionchevron-rightPE Injection: Executing PEs inside Remote Processeschevron-rightAPI Monitoring and Hooking for Offensive Toolingchevron-rightWindows API Hookingchevron-rightImport Adress Table (IAT) Hookingchevron-rightDLL Injection via a Custom .NET Garbage Collectorchevron-rightWriting and Compiling Shellcode in Cchevron-rightInjecting .NET Assembly to an Unmanaged Processchevron-rightBinary Exploitationchevron-right

Last updated