# Code & Process Injection

* [CreateRemoteThread Shellcode Injection](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/createremotethread-shellcode-injection)
* [DLL Injection](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/dll-injection)
* [Reflective DLL Injection](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/reflective-dll-injection)
* [Shellcode Reflective DLL Injection](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/shellcode-reflective-dll-injection)
* [Process Doppelganging](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/process-doppelganging)
* [Loading and Executing Shellcode From PE Resources](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/loading-and-executing-shellcode-from-pe-resources)
* [Process Hollowing and Portable Executable Relocations](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/process-hollowing-and-portable-executable-relocations)
* [APC Queue Code Injection](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/apc-queue-code-injection)
* [Early Bird APC Queue Code Injection](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/early-bird-apc-queue-code-injection)
* [Shellcode Execution in a Local Process with QueueUserAPC and NtTestAlert](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/shellcode-execution-in-a-local-process)
* [Shellcode Execution through Fibers](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/shellcode-execution-through-fibers)
* [Shellcode Execution via CreateThreadpoolWait](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/shellcode-execution-via-createthreadpoolwait)
* [Local Shellcode Execution without Windows APIs](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/local-shellcode-execution-without-windows-apis)
* [Injecting to Remote Process via Thread Hijacking](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/injecting-to-remote-process-via-thread-hijacking)
* [SetWindowHookEx Code Injection](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/setwindowhookex-code-injection)
* [Finding Kernel32 Base and Function Addresses in Shellcode](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/finding-kernel32-base-and-function-addresses-in-shellcode)
* [Executing Shellcode with Inline Assembly in C/C++](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/executing-shellcode-with-inline-assembly-in-c-c++)
* [Writing Custom Shellcode Encoders and Decoders](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/writing-custom-shellcode-encoders-and-decoders)
* [Backdooring PE Files with Shellcode](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/backdooring-pe-files-with-shellcode)
* [NtCreateSection + NtMapViewOfSection Code Injection](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/ntcreatesection-+-ntmapviewofsection-code-injection)
* [AddressOfEntryPoint Code Injection without VirtualAllocEx RWX](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/addressofentrypoint-code-injection-without-virtualallocex-rwx)
* [Module Stomping for Shellcode Injection](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/module-stomping-for-shellcode-injection)
* [PE Injection: Executing PEs inside Remote Processes](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/pe-injection-executing-pes-inside-remote-processes)
* [API Monitoring and Hooking for Offensive Tooling](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/api-monitoring-and-hooking-for-offensive-tooling)
* [Windows API Hooking](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/windows-api-hooking)
* [Import Adress Table (IAT) Hooking](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/import-address-table-iat-hooking)
* [DLL Injection via a Custom .NET Garbage Collector](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/dll-injection-via-a-custom-.net-garbage-collector)
* [Writing and Compiling Shellcode in C](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/writing-and-compiling-shellcode-in-c)
* [Injecting .NET Assembly to an Unmanaged Process](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/injecting-.net-assembly-to-an-unmanaged-process)
* [Binary Exploitation](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation)
