Hacker's Notes
search
⌘Ctrlk
The Hacker's Notes
Hacker's Notes
  • THE HACKER'S NOTES
  • Fundamentals
    • Learning Process
    • Computer Fundamentals
    • Network Fundamentals
    • Unix Fundamentals
    • Hacking Fundamentals
  • Pentesting Cheatsheets
    • Pentesting Cheatsheets
    • SQL Injection & XSS Playground
  • offensive security
    • Red Team Infrastructure
    • MITRE ATT&CK
    • Initial Access
    • Code Execution
    • Code & Process Injection
      • CreateRemoteThread Shellcode Injection
      • DLL Injection
      • Reflective DLL Injection
      • Shellcode Reflective DLL Injection
      • Process Doppelganging
      • Loading and Executing Shellcode From PE Resources
      • Process Hollowing and Portable Executable Relocations
      • APC Queue Code Injection
      • Early Bird APC Queue Code Injection
      • Shellcode Execution in a Local Process
      • Shellcode Execution through Fibers
      • Shellcode Execution via CreateThreadpoolWait
      • Local Shellcode Execution without Windows APIs
      • Injecting to Remote Process via Thread Hijacking
      • SetWindowHookEx Code Injection
      • Finding Kernel32 Base and Function Addresses in Shellcode
      • Executing Shellcode with Inline Assembly in C/C++
      • Writing Custom Shellcode Encoders and Decoders
      • Backdooring PE Files with Shellcode
      • NtCreateSection + NtMapViewOfSection Code Injection
      • AddressOfEntryPoint Code Injection without VirtualAllocEx RWX
      • Module Stomping for Shellcode Injection
      • PE Injection: Executing PEs inside Remote Processes
      • API Monitoring and Hooking for Offensive Tooling
      • Windows API Hooking
      • Import Address Table (IAT) Hooking
      • DLL Injection via a Custom .NET Garbage Collector
      • Writing and Compiling Shellcode in C
      • Injecting .NET Assembly to an Unmanaged Process
      • binary-exploitation
    • Defense Evasion
    • Enumeration and Discovery
    • Privilege Escalation
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • Active Directory
    • Active Directory & Kerberos Abuse
  • Reversing, forensics & misc
    • Internals
    • AWS Accounts, Users, Groups, Roles, Policies
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++
    • Reversing Password
  • HACKING MANUEL
    • Hacking Methodology
    • Pentesting Web checklist
  • RECONNAISSANCE
    • OSINT
    • Public info gathering
    • Basic recon
    • Root domains
    • Subdomain Enum
    • DNS (Domain Name Systems) Pentesting
    • MDNS (Multicast DNS) Pentesting
    • Port Scan
    • Network Scanning
    • Host Scanning
    • Packet Scanning
    • Find Leaked API Keys
    • Email Analysis
    • Webs recon
    • Web Basic Pentesting
    • Windows Forensics
    • Active Directory Pentesting
    • AD CS (Active Directory Certificate Services) Pentesting
    • Cloud Info Gathering
    • Dark-Web Search
    • Social Engineering
  • Enumeration
    • 🟢Information Gathering
    • Files
    • SSL/TLS
    • Ports
    • WEB App Technologies
    • Unix Enum
    • Windows Enum
  • Exploitation
    • 🟢Pre-Exploitation
    • 🟢Exploitation
    • WEB App Attacks
    • Payloads
    • Reverse Shells
    • File transfer
    • Unix Exploit
    • Window Exploit
  • Privilege Escalation
    • 🟢Post-Exploitation
    • Linux Priv Esca
    • Unix Priv Esca
    • Window Priv Esca
  • PIVOTING/LATERAL MOVEMENT
    • 🟢Lateral Movement
    • 🟢Pivoting
    • Unix Piv/Lateral
    • Pivoting in Linux
    • Window Piv/Lateral
  • DATA EXFILTRATION
    • Unix Data Exfilt
    • Backdoors in Linux
    • Window Data Exfilt
  • PERSISTENCE
    • Unix Persist
    • Cover Your Tracks in Linux
    • Window Persist
  • NETWORK HACKING
    • Apache Hadoop Pentesting
    • ARP (Address Resolution Protocol) Spoofing
    • EthernetIP Pentesting
    • FastCGI Pentesting
    • Firewall
    • GRPC Pentesting
    • ReDoS (Regular Expression Denial of Service)
    • Rsync Pentesting
    • Protocols
  • WIRELESS HACKING
    • Wifi Enum
    • Wifi Exploit
    • Wifi Priv
    • Bluetooth
    • VPN
    • Audio/Tv Hacking
  • EMAIL HACKING
    • IMAP Pentesting
    • POP Pentesting
    • Receive Email as Another Address
    • SMTP Pentesting
  • DATABASE HACKING
    • CouchDB Pentesting
    • InfluxDB Pentesting
    • MongoDB Pentesting
    • MSSQL (Microsoft SQL) Pentesting
    • MySQL Pentesting
    • Neo4j Pentesting
    • PostgreSQL Pentesting
    • Redis Pentesting
    • SQLite Pentesting
  • CLOUD HACKING
    • General
    • AWS
    • Azure
    • GCP
    • CDN - Comain Fronting
    • Docker && Kubernetes
    • Virtual Machine
    • Git Pentesting
    • Gitea Pentesting
    • Gogs Pentesting
  • AI HACKING
    • AI Prompt Injection
    • Attack_techniques
    • Attack_evasions
    • Attack_intents
    • Ai_enabled_app_defense_checklist
    • Ai_sec_questionnaire
    • Ai_threat_model_questions
    • LLM/AI/ML/prompt testing
  • MACHINE LEARNING HACKS
    • Jupyter Notebook Pentesting
    • Orange Data Mining
    • Read HDF5 (H5) File
    • Read PT File
    • Read PT File
    • Computer Vision
    • Data Processing
    • Create Malicious ML Model
  • CODE HACKING
    • Code review
    • Sinks
  • MOBILE HACKING
    • General
    • Android
    • iOS
  • BLOCKCHAIN HACKING
    • Ethereum
    • Attack Methodology
  • CRYPTOGRAPHY HACKING
    • Cryptography Basic
    • Password Safe Pentesting
    • PowerShell Credentials
    • John the Ripper
    • Algorithim Pentesting
    • Key Derivation
    • Math
  • IOT HACKING
    • Printer Pentesting
    • IPP (Internet Printing Protocol) Pentesting
  • HARDWARE HACKING
    • Flipper Zero
    • Firmware Analysis
    • Gerber (GBR) Files
    • MQTT Pentesting
    • NETGEAR Pentesting
    • SAL Logic Analysis
  • WRITEUPS
    • THM Walkthroughs
    • HTB Walkthroughs
    • OSCP Preparation
    • CRTP Prepration
    • Labs writeups
    • Blogs/Gitbooks Links
    • Portswigger writeups
  • BugBounty
    • BugBounty Methodology
    • BugBounty Resources
  • Tools
    • Privacy
    • Steganography
    • Password cracking
    • Windows Tools
    • Burp Suite
    • Scripting
    • Red Team Resources
    • Hacking Tools
    • Internal Pentest
    • Report template
    • Random
    • Wireshark Cheat Sheet
    • Tshark Cheat Sheet
    • Master assessment mindmaps
    • Convert PuTTY Key to OpenSSH Key
    • Decrypt SolarPuTTY Sessions Files
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. offensive security

Code & Process Injection

  • CreateRemoteThread Shellcode Injection

  • DLL Injection

  • Reflective DLL Injection

  • Shellcode Reflective DLL Injection

  • Process Doppelganging

  • Loading and Executing Shellcode From PE Resources

  • Process Hollowing and Portable Executable Relocations

  • APC Queue Code Injection

  • Early Bird APC Queue Code Injection

  • Shellcode Execution in a Local Process with QueueUserAPC and NtTestAlert

  • Shellcode Execution through Fibers

  • Shellcode Execution via CreateThreadpoolWait

  • Local Shellcode Execution without Windows APIs

  • Injecting to Remote Process via Thread Hijacking

  • SetWindowHookEx Code Injection

  • Finding Kernel32 Base and Function Addresses in Shellcode

  • Executing Shellcode with Inline Assembly in C/C++

  • Writing Custom Shellcode Encoders and Decoders

  • Backdooring PE Files with Shellcode

  • NtCreateSection + NtMapViewOfSection Code Injection

  • AddressOfEntryPoint Code Injection without VirtualAllocEx RWX

  • Module Stomping for Shellcode Injection

  • PE Injection: Executing PEs inside Remote Processes

  • API Monitoring and Hooking for Offensive Tooling

  • Windows API Hooking

  • Import Adress Table (IAT) Hooking

  • DLL Injection via a Custom .NET Garbage Collector

  • Writing and Compiling Shellcode in C

  • Injecting .NET Assembly to an Unmanaged Process

  • Binary Exploitation

PreviousPubprn.vbs Signed Script Code Executionchevron-leftNextCreateRemoteThread Shellcode Injectionchevron-right

Last updated 1 month ago