Amputate 0.1.0

crate for (currently windows) process injections using different techniques
docs.rs failed to build Amputate-0.1.0
Please check the build logs for more information.
See Builds for ideas on how to fix a failed build, or Metadata for how to configure docs.rs builds.
If you believe this is docs.rs' fault, open an issue.
A place for popular offensive tradecraft  techniques

usage : 
fn code_inject("explorer",[0x00,0x0a.......].to_vec());  // injects raw shellcode into the given process 

fn loadl_dll("explorer","C:\temp\shell.dll") // injects the dll into the given process 

hold on while I update more techniques that not only include shellcode and injection techniques but also detours,manualmappings,apicall cloaks and ....