A very common technique used by threat actors as well as Red Teams is Process Injection. By using Process Injection, any position-independent code (shellcode) can be written into a remote process and executed within that process, so that it afterward runs in the context of it.
Process Injection - Avoiding Kernel Triggered Memory Scans
This blog post was written and published on my employer’s website, where it can be found here: