This document discusses techniques for remote code execution in restricted Windows environments, specifically focusing on stagers. A stager is shellcode responsible for fetching and executing the next stage, such as malware or an implant. The document provides examples of open source stagers and frameworks that can be reused for implants. It also covers transport protocols, techniques for socket hunting to reuse existing connections, and drawbacks of "universal" stagers that try to be exploit agnostic.