In this article, we will build upon what we learned in the previous article, “Introduction to Win32 API,” and learn how to inject shellcode into an existing process. Process injection is useful because it allows us to run our malicious code from within a trusted process, making it much more evasive. If you missed it, you can find the previous article here. Process Injection # In the last post, we talked about how each process has its own virtual address space.