Process Injection - Avoiding Kernel Triggered Memory Scans

A very common technique used by threat actors as well as Red Teams is Process Injection. By using Process Injection, any position-independent code (shellcode) can be written into a remote process and executed within that process, so that it afterward runs in the context of it.

Process Injection - Avoiding Kernel Triggered Memory Scans

This blog post was written and published on my employer’s website, where it can be found here:

If you like what I'm doing consider --> <-- or become a Patron for a coffee or beer.