Last updated 1 year ago
Introduction
Abusing Processes
Expanding Process Abuse
Abusing Process Components
Abusing DLLs
Memory Execution Alternatives
Case Study in Browser Injection and Hooking
Conclusion