Skip to main content
SpecterOps Open Source home page
Mythic Agent: Apollo
Search...
⌘K
Toolkit Hub
Contact Us
Contact Us
Search...
Navigation
shinject
Overview
Commands
C2 Profiles
OPSEC
Contributing
Apollo
assembly_inject
blockdlls
cat
cd
cp
dcsync
download
execute_assembly
execute_coff
execute_pe
exit
get_injection_techniques
getprivs
ifconfig
inject
inline_assembly
jobkill
jobs
keylog_inject
kill
link
listpipes
ls
make_token
mimikatz
mkdir
mv
net_dclist
net_localgroup
net_localgroup_member
net_shares
netstat
powerpick
powershell
powershell_import
ppid
printspoofer
ps
psinject
pth
pwd
reg_query
reg_write_value
register_assembly
register_coff
register_file
rev2Self
rm
run
sc
screenshot
screenshot_inject
set_injection_technique
shell
shinject
sleep
socks
title = "spawn"
spawnto_x64
spawnto_x86
steal_token
ticket_cache_add
ticket_cache_extract
ticket_cache_list
ticket_cache_purge
ticket_store_add
ticket_store_list
ticket_store_purge
unlink
upload
whoami
wmi_execute
On this page
Summary
Arguments (Popup)
PID
Shellcode
Usage
MITRE ATT&CK Mapping
shinject
Converted from Markdown to MDX
Artifacts Generated: Process Inject
Summary
Inject arbitrary shellcode into a remote process.
Arguments (Popup)
PID
Target process ID to inject into.
Shellcode
File containing position independant shellcode.
Usage
Copy
Ask AI
shinject
MITRE ATT&CK Mapping
T1055
shell
sleep
⌘I