Payload Injection on Windows
In this series we explore using Rust and the Windows API to inject and execute shellcode in our own process. The series covers several techniques for injection starting with using userland API calls, then calling undocumented API functions in NTDLL, and finally using Syswhispers to make system calls from our own process.- Payload Injection on Windows Part III We explore bypassing userland API calls and call functions directly from NTDLL.dll
- Payload Injection on Windows Part II We revisit our code from part I and try to create a safe(r) Rust wrapper for it
- Payload Injection on Windows Part I Payload Injection on Windows using Rust and the Windows API