Home
Search
Map
Scan
Resources
Technique List
Snippet List
Detection Rule List
Featured Evasion API List
Contributors
Scanned Samples
Tools
About
API
Unprotect API
API Documentation
Login
Map
Process Manipulating
Process Manipulating
Technique Name
Technique ID's
Snippet(s)
Rules(s)
OS
Breaking BaDDEr
U1201
DNS API Injection
U1202
CLIPBRDWNDCLASS
U1203
WordWarping
U1204
FIleless Mechanisms
U1205
B0027.001
OLEUM
U1206
Listplanting
U1207
Treepoline
U1208
ConsoleWindowClass
U1209
Process Reimaging
U1210
Inline Hooking
U1211
F0015.002
COM Hijacking
U1212
Ctrl+Inject
U1213
Propagate
U1214
Process Doppelgänging
U1215
PE Injection
U1216
E1055.002
IAT Hooking
U1217
F0015.003
Injection using Shims
U1218
E1055.m03
Extra Window Memory Injection
U1219
E1055.011
Atom Bombing
U1220
APC injection
U1221
E1055.004
Image File Execution Options Injection
U1222
Thread Execution Hijacking
U1223
E1055.003
Reflective DLL injection
U1224
Process Hollowing, RunPE
U1225
E1055.012
DLL Injection via CreateRemoteThread and LoadLibrary
U1226
E1055.001
Hook Injection
U1227
E1055.m01
Entry Point Modification
U1228
EditWordBreakProc
U1229
Process Camouflage, Masquerading
U1230
F0005
Process Herpaderping
U1231
Process Ghosting
U1232
Access Token Manipulation: Parent PID Spoofing
U1234
T1134.004
ProcEnvInjection - Remote code injection by abusing process environment strings
U1235
Shellcode Injection via CreateThreadpoolWait
U1236
NLS Code Injection Through Registry
U1237
Change Module Name at Runtime
U1238
Change Module Base Address at Runtime
U1239
DLL Proxying
U1240
Tamper DLL Export Names & GetProcAddress Spoofing
U1241
Dirty Vanity
U1242
Process Argument Spoofing
U1243
AppInit DLL Injection
U1244
T1546
Event Triggered Execution: Linux Inotify
U1245
T1546