This Metasploit module will inject a payload into memory of a process. If a payload isn't selected, then it'll default to a reverse x86 TCP meterpreter. If the PID datastore option isn't specified, then it'll inject into notepad.exe instead.
19c7c53f42d760a9afadc94975ca390c02a34390696f9912af9f0ec1463460e1