SECMONS SECMONS
Dashboard Vulnerabilities Threat Actors Malware Attack Techniques Breaches Scams Research Guides News Glossary
SECMONS
Dashboard Vulnerabilities Threat Actors Malware Attack Techniques Breaches Scams Research Guides News Glossary
Home / Tags

Evasion-Techniques

Process Hollowing
Process Hollowing is a malware execution technique where attackers create a legitimate process in a suspended state and replace its memory with malicious code to evade security detection.
Memory Injection
Memory Injection is a malware execution technique in which malicious code is inserted directly into system memory rather than written to disk, allowing attackers to evade traditional file-based security detection.
Bootkit
A Bootkit is a type of stealth malware that infects the system boot process, allowing malicious code to execute before the operating system loads and enabling attackers to maintain deep persistence and evade security controls.
Process Injection
Process Injection is a malware technique used by attackers to execute malicious code inside the memory space of another legitimate process in order to evade security detection and maintain stealth during an intrusion.
Rootkit
A Rootkit is a stealthy type of malicious software designed to hide its presence on a compromised system while maintaining privileged access and allowing attackers to control the infected machine without detection.
Facts
Created 2008-01-01
Updated 2026-03-12
Category tags
Reading time 0 min
Sponsored
Advertisement space reserved.
Latest Intel
  • Cyber Threat Landscape Analysis for March 2026
  • API Abuse and Data Extraction Techniques 2026
  • SaaS Account Takeover Patterns and Risks 2026
  • GitHub Abuse for Malware Delivery in 2026
  • Infostealer Logs Economy and Abuse in 2026
Follow Updates
  • RSS Feed
  • Subscribe

Legal & Policies

  • Terms of Service (TOS)
  • Privacy Policy
  • Cookie Policy
  • Disclaimer
  • Affiliate Disclosure

Governance

  • Vulnerability Policy
  • Editorial Policy
  • Ethics & Governance
  • Methodology

Research & Intelligence

  • Research
  • Threat Actors
  • Zero-Day Tracker
  • Exploit Database
  • Reports

Resources

  • Resources
  • Sitemap
  • RSS

Company

  • Meet the Experts / Authors
  • About Us
  • Contact & Press
  • Careers / Join Us
© 2026 SECMONS. All rights reserved.
CtrlK
Search the site.
    Privacy & Analytics

    SECMONS uses optional analytics and advertising-related consent settings to improve measurement and prepare future services. Essential site functionality remains available either way.

    Cookie Policy · Privacy Policy
    Essential
    Required for core site functionality and security.
    Always active
    Analytics
    Measurement of page usage and content performance.
    Ad storage
    Storage related to advertising functionality and attribution.
    Ad user data
    Consent for sending advertising-related user data to Google.
    Ad personalization
    Consent for personalized advertising features in the future.