Infiltr8: The Red-Book
search
โŒ˜Ctrlk
Infiltr8ForumGitHub
Infiltr8: The Red-Book
  • The Red-Book
  • Red-Teaming
    • Reconnaissance
    • Execution
      • Code & Process Injection
        • Loading .NET Reflective Assembly
        • Loading .NET Assembly from Windows Script Hosting
        • Process Hollowing
        • WndProc Callback Shellcode Execution
        • Fibers Shellcode Execution
        • Vector Exception Handler Shellcode Execution
        • NtQueueApcThread & NtTestAlert Shellcode Execution
        • Thread Pool Callback Shellcode Execution
        • Module Stomping Shellcode Injection
        • Remote .NET Assembly Loading through WaaSRemediation DCOM Abuse
        • ๐Ÿ› ๏ธDLL Injection
        • ๐Ÿ› ๏ธCreateRemoteThread Injection
        • ๐Ÿ› ๏ธReflective DLL Injection
        • ๐Ÿ› ๏ธNtMapViewOfSection Injection
        • ๐Ÿ› ๏ธSetWindowHookEx Injection
        • ๐Ÿ› ๏ธPoolParty
        • ๐Ÿ› ๏ธMockingJay
      • Code Execution
    • Initial Access
    • Persistence
    • Defense Evasion
    • Discovery
    • Privilege Escalation
    • Credential Access
    • Lateral Movement
    • Exfiltration
  • Web Pentesting
    • Reconnaissance
    • Infrastructures
    • Web Vulnerabilities
  • Network Pentesting
    • Network services
    • WiFi
    • Bluetooth
  • Active Directory Pentesting
    • Reconnaissance
    • Movement
    • Persistence
  • Smart Contracts Pentesting
    • On-Chain Analysis
    • Smart Contract Vulnerabilities
  • Cloud & CI/CD Pentesting
    • Kubernetes
    • CI/CD
    • Azure Pentesting
    • ๐Ÿ› ๏ธGCP Pentesting
    • ๐Ÿ› ๏ธAWS Pentesting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Red-Teamingchevron-right
  2. Execution

Code & Process Injection

Loading .NET Reflective Assemblychevron-rightLoading .NET Assembly from Windows Script Hostingchevron-rightProcess Hollowingchevron-rightWndProc Callback Shellcode Executionchevron-rightFibers Shellcode Executionchevron-rightVector Exception Handler Shellcode Executionchevron-rightNtQueueApcThread & NtTestAlert Shellcode Executionchevron-rightThread Pool Callback Shellcode Executionchevron-rightModule Stomping Shellcode Injectionchevron-rightRemote .NET Assembly Loading through WaaSRemediation DCOM Abusechevron-right๐Ÿ› ๏ธDLL Injectionchevron-right๐Ÿ› ๏ธCreateRemoteThread Injectionchevron-right๐Ÿ› ๏ธReflective DLL Injectionchevron-right๐Ÿ› ๏ธNtMapViewOfSection Injectionchevron-right๐Ÿ› ๏ธSetWindowHookEx Injectionchevron-right๐Ÿ› ๏ธPoolPartychevron-right๐Ÿ› ๏ธMockingJaychevron-right

Last updated 2 years ago