# To Do

## To Do

* [ ] Binary Exploitation / Rev CTFs
* [ ] Memory Layout
* [ ] x86 Memory Addressing & x86 Calling Convention
* [ ] VirusTotal 0 detections
* [ ] IAT Hooking / Spoofing
* [ ] Trampolines  / Detours
* [ ] Anti analysis / Anti VM&#x20;
* [ ] Sys internals
* [ ] Mapping Injection variation
* [ ] Get Processes list&#x20;
* [ ] Process Self Deletion

## Explored

* [ ] [Process Injection](https://reze.gitbook.io/bin/maldev/process-injection)
* [ ] [Execute Shellcode without calling Windows API](https://reze.gitbook.io/bin/maldev/process-injection#bonus-method-no-winapi)
* [ ] [DLL Injection](https://reze.gitbook.io/bin/maldev/process-injection/dll-injection)
* [ ] [APC Injection](https://reze.gitbook.io/bin/maldev/process-injection/apc-injection)
* [ ] [Special User-Mode APC](https://reze.gitbook.io/bin/maldev/process-injection/apc-injection#special-apc-bonus)
* [ ] [NTAPI Process Injection](https://reze.gitbook.io/bin/maldev/process-injection/ntapi-implementation)
* [ ] [PE Structure](https://reze.gitbook.io/bin/winternal/pe-structure) & [PE Parser](https://reze.gitbook.io/bin/winternal/pe-parser-pextractor)
* [ ] [x86 Overview](https://reze.gitbook.io/bin/assembly-x86/x86-architecture-overview) & [x86 Basic Program](https://reze.gitbook.io/bin/assembly-x86/x86-basic-program)
* [ ] [Maldev - Rust implementation](https://reze.gitbook.io/bin/rust-maldev/rust-malware-part-1)
* [ ] [Reversing our malware](https://reze.gitbook.io/bin/r.e./reversing-with-x64dbg)
* [ ] [Direct & Indirect Syscalls](https://reze.gitbook.io/bin/maldev/process-injection/direct-system-call)
* [ ] Mapping Injection
* [ ] PEB & TEB
* [ ] Faking Arguments
* [ ] PPID Spoofing
