الفريق العربي للهندسة العكسية
ProcessInjectionTechniques by offensive-panda - نسخة قابلة للطباعة

+- الفريق العربي للهندسة العكسية (https://www.at4re.net/f)
+-- قسم : ENGLISH FORUM (https://www.at4re.net/f/forum-6.html)
+--- قسم : Tutorials (https://www.at4re.net/f/forum-14.html)
+--- الموضوع : ProcessInjectionTechniques by offensive-panda (/thread-4638.html)



ProcessInjectionTechniques by offensive-panda - Stingered - 10-07-2025

ProcessInjectionTechniques by offensive-panda
https://offensive-panda.github.io/ProcessInjectionTechniques/


Classic Code Injection Local Process
https://offensive-panda.github.io/ProcessInjectionTechniques/Classic_Code_Injection_Local/

Classic Code Injection Remote Process
https://offensive-panda.github.io/ProcessInjectionTechniques/Classic_Code_Injection_Remote/

Classic Code Injection With APIs Obfuscation
https://offensive-panda.github.io/ProcessInjectionTechniques/Classic_Code_Injection_API_Obfuscate/

Classic Code Injection Remote Process Using VirtualProtect
https://offensive-panda.github.io/ProcessInjectionTechniques/Classic_Code_Injection_Remote_VP/

Classic DLL Injection
https://offensive-panda.github.io/ProcessInjectionTechniques/Classic_DLL_Injection/

Reflective DLL Injection
https://offensive-panda.github.io/ProcessInjectionTechniques/Reflective_DLL_Injection/

Unhook NTDLL.DLL (Lagos Island)
https://offensive-panda.github.io/ProcessInjectionTechniques/Reflective_DLL_Loading_Lagos_Island/

Process Hollowing
https://offensive-panda.github.io/ProcessInjectionTechniques/Process_Hollowing/

PE injection
https://offensive-panda.github.io/ProcessInjectionTechniques/PE_Code_Injection/

AddressOfEntryPoint injection
https://offensive-panda.github.io/ProcessInjectionTechniques/AddressOfEntryPoint_Code_Injection/

APC injection
https://offensive-panda.github.io/ProcessInjectionTechniques/APC_QUEUE_INJECTION/

EarlyBir injection
https://offensive-panda.github.io/ProcessInjectionTechniques/EarlyBird_Code_Injection/

RWX Region Hunting and Injection
https://offensive-panda.github.io/ProcessInjectionTechniques/RWX_Hunting_Injection/

Process Ghosting
https://offensive-panda.github.io/ProcessInjectionTechniques/Process_Ghosting/

Module Stomping
https://offensive-panda.github.io/ProcessInjectionTechniques/Module_Stomping/

Remote Thread Hijacking
https://offensive-panda.github.io/ProcessInjectionTechniques/Remote_Thread_Hijacking/

PEB Walk Injection
https://offensive-panda.github.io/ProcessInjectionTechniques/PEB_WALK_INJECTION/

PEB Walk and APIs obfuscation Technique
https://offensive-panda.github.io/ProcessInjectionTechniques/PEB_WALK_API_OBFUSCATION/

NtCreateSection and MapViewOfSection
https://offensive-panda.github.io/ProcessInjectionTechniques/NtCreateSection_MapViewOfSection/

Mokingjay
https://offensive-panda.github.io/ProcessInjectionTechniques/Mokingjay/

Fork API Injection
https://offensive-panda.github.io/ProcessInjectionTechniques/DV_NEW/

Injection through Fibers
https://offensive-panda.github.io/ProcessInjectionTechniques/Injection_Through_Fiber/

NTAPI injection
https://offensive-panda.github.io/ProcessInjectionTechniques/NTAPI_Injection/

Direct SYS Calls
https://offensive-panda.github.io/ProcessInjectionTechniques/DirectSyscalls/

Indirect SYS Calls
https://offensive-panda.github.io/ProcessInjectionTechniques/IndirectSyscalls/


References:
https://attack.mitre.org/techniques/T1055/
https://www.linkedin.com/in/usman-sikander13/
https://github.com/deepinstinct/Dirty-Vanity
https://www.securityjoes.com/post/process-mockingjay-echoing-rwx-in-userland-to-achieve-code-execution
https://www.ired.team/
https://github.com/jthuraisamy/SysWhispers2
https://github.com/klezVirus/SysWhispers3
https://github.com/RedTeamOperations/Advanced-Process-Injection-Workshop
https://www.cytomate.net

GITHUB content: 1.67gb
https://github.com/Offensive-Panda/ProcessInjectionTechniques

See attached for downloadable web content in PDF format (94mb)