A BOF for each technique discovered by 0xDeku@SafeBreach-Labs, to abuse Windows Thread Pools.
inject-poolparty <PID> <raw shellcode file path> <technique number>
Please note that for obvious reasons no evasion techniques were implemented, except of no RWX memory allocations, randomized names and minimal disk footprint.
You can find the source of every technique in the respective header file and customize the code as desired. All functions, structs and enums are defined in the PoolParty.h header file.