Summary
In this chapter, we learned about the details of export functions and how to build our own DLL parser without relying on the Windows GetProcAddress
function, crawl through dynamic memory for export functions, and write our own Windows shellcode. Finally, we can even develop a shellcode generator via Python. With this knowledge and these skills, we will be able to develop our own testing tools for penetration testing in the future, rather than being limited to the tools already developed.