# Code & Process Injection

- [Loading .NET Reflective Assembly](/redteam/weapon/code-and-process-injection/.net-reflective-assembly.md): MITRE ATT\&CK™ Reflective Code Loading - Technique T1620
- [Loading .NET Assembly from Windows Script Hosting](/redteam/weapon/code-and-process-injection/.net-assembly-from-windows-script-hosting.md): MITRE ATT\&CK™ Reflective Code Loading - Technique T1620
- [Process Hollowing](/redteam/weapon/code-and-process-injection/process-hollowing.md): MITRE ATT\&CK™ Process Injection: Process Hollowing - Technique T1055.012
- [WndProc Callback Shellcode Execution](/redteam/weapon/code-and-process-injection/wndproc-callback-shellcode-execution.md)
- [Fibers Shellcode Execution](/redteam/weapon/code-and-process-injection/fibers-shellcode-execution.md)
- [Vector Exception Handler Shellcode Execution](/redteam/weapon/code-and-process-injection/vector-exception-handler-shellcode-execution.md)
- [NtQueueApcThread & NtTestAlert Shellcode Execution](/redteam/weapon/code-and-process-injection/ntqueueapcthread-and-nttestalert-shellcode-execution.md): MITRE ATT\&CK™ Process Injection: Asynchronous Procedure Call - Technique T1055.004
- [Thread Pool Callback Shellcode Execution](/redteam/weapon/code-and-process-injection/thread-pool-callback-shellcode-execution.md)
- [Module Stomping Shellcode Injection](/redteam/weapon/code-and-process-injection/module-stomping-shellcode-injection.md)
- [Remote .NET Assembly Loading through WaaSRemediation DCOM Abuse](/redteam/weapon/code-and-process-injection/remote-.net-assembly-loading-through-waasremediation-dcom-abuse.md)
- [DLL Injection](/redteam/weapon/code-and-process-injection/dll-injection.md)
- [CreateRemoteThread Injection](/redteam/weapon/code-and-process-injection/createremotethread-injection.md)
- [Reflective DLL Injection](/redteam/weapon/code-and-process-injection/reflective-dll-injection.md)
- [NtMapViewOfSection Injection](/redteam/weapon/code-and-process-injection/ntmapviewofsection-injection.md)
- [SetWindowHookEx Injection](/redteam/weapon/code-and-process-injection/setwindowhookex-injection.md)
- [PoolParty](/redteam/weapon/code-and-process-injection/poolparty.md)
- [MockingJay](/redteam/weapon/code-and-process-injection/mockingjay.md)
