Payload Injection on Windows

In this series we explore using Rust and the Windows API to inject and execute shellcode in our own process. The series covers several techniques for injection starting with using userland API calls, then calling undocumented API functions in NTDLL, and finally using Syswhispers to make system calls from our own process.