Executing Shellcode using function callbacks.
Creating a C++ DLL to modify a target applications behaviour.
Walking an x64 call stack using UNWIND data structures.
Ways of making payloads a little less suspicious.
Using user-mode APC functions to execute code in remote processes.
Writing sleep masks in x64 assembly.
Using GetDelegateForFunctionPointer to execute Win32 API’s from memory in Powershell.
A list of common WinDBG commands.
Executing DLL’s from memory.
Injecting DLL’s into remote processes.
Writing stagers to interact with foreign C2 frameworks.
A Metasploit command reference.