This Thursday’s Lecture will be on a post exploitation technique used to hide and generate effects on a target system with reflective dynamically linked library injection on a Windows 10 machine. It involves writing and executing arbitrary code inside another process, and bypassing the DLL load monitoring of Windows to run the DLL.