This document summarizes techniques discussed at Black Hat 2017 for process injection, post-exploitation tools, cache-side channel attacks, and data-oriented attacks. For process injection, it describes hollow process injection and references papers on atom bombing and evasive hollow process injection techniques. For post-exploitation, it summarizes talks on using signed binaries and the Shadow debugging tool. Regarding cache attacks, it outlines talks on exploitability/countermeasures and SGX attacks. Mitigation techniques like secret-independent code and page coloring are also briefly mentioned.