# MalDev

- [Introduction](/bin/maldev/introduction.md): Introduction to Malware Development
- [Process Injection](/bin/maldev/process-injection.md): Local & Remote Process Injection
- [DLL Injection](/bin/maldev/process-injection/dll-injection.md): Injecting DLL into a Process
- [NTAPI Injection](/bin/maldev/process-injection/ntapi-injection.md): Process Injection using the low level NTAPI functions
- [APC Injection](/bin/maldev/process-injection/apc-injection.md): Injecting shellcode into legitimate process by abusing the Windows APC technique
- [Early Bird & Special APC](/bin/maldev/process-injection/early-bird-and-special-apc.md)
- [Direct System Call](/bin/maldev/process-injection/direct-system-call.md): Finally I talk about sys calls :)
- [Indirect System Call](/bin/maldev/process-injection/indirect-system-call.md)
- [Mapping Injection](/bin/maldev/process-injection/mapping-injection.md)
- [Evasion](/bin/maldev/evasion.md): Techniques to evade defender / av / edrs
- [PPID Spoofing](/bin/maldev/evasion/ppid-spoofing.md): Parent PID Spoofing
- [Process Argument Spoofing](/bin/maldev/evasion/process-argument-spoofing.md): powershell.exe -c echo "I am safe :)"
- [Anti Debugging Techniques](/bin/maldev/evasion/anti-debugging-techniques.md)
- [API Hashing](/bin/maldev/evasion/api-hashing.md)
- [Self Deletion](/bin/maldev/evasion/self-deletion.md): Malware Suicide
- [API Hooking - Trampoline](/bin/maldev/evasion/api-hooking-trampoline.md): Hooking WinAPIs using Trampolines
- [Hell's Gate](/bin/maldev/hells-gate.md)
- [Independent Malware](/bin/maldev/independent-malware.md)
- [Rust Malware](/bin/maldev/rust-malware.md)
- [Process Injection](/bin/maldev/rust-malware/process-injection.md): Simple Process Injection in Rust
- [API Hooking - Detours I](/bin/maldev/rust-malware/api-hooking-detours-i.md)
