This document summarizes memory-based attacker techniques used by malware and the importance of hunting for these techniques in memory. It describes common injection methods like reflective DLL injection and process hollowing. Specific malware examples that use these techniques are provided, like Poison Ivy, Meterpreter, and DarkComet. Existing memory analysis tools are listed as well as a new PowerShell module for hunting injected threads in memory at scale. The PowerShell module detects injected threads by checking for non-image backed memory pages and provides details on suspicious processes and threads.