Local Payload Execution
Source provenance. Raw material catalogued for the wiki ingest pipeline. Lives offline at
raw_sources/offensive-security/Local Payload Execution.md.
Status: catalogued
Excerpt
Module 26 - Local Payload Execution - DLL This module explores the usage of Dynamic Link Libraries (DLLs) as payloads and demonstrates how to load a malicious DLL file in the current process. Creating a DLL is simple and can be done using Visual Studio. Create a new project, set the programming language to C++, and finally select Dynamic-Link Library (DLL). This will create a DLL skeleton code tha…
Likely wiki targets
Pending — this source has not yet been distilled into wiki pages. Future ingest can populate links to the concept / technique / CVE pages this material would inform.
