Patching or modifying binaries have been a common practice for security professionals and malicious actors alike for many years. The speaker will present an open source tool that patches Microsoft win32/64 binaries by using existing or new codecaves to store user selected shellcode, which continues normal execution of the infected binary. In addition, the speaker will discuss methods to bypass anti-virus solutions, attack vectors in which a tool like this can be used, and the associated mitigations necessary to protect a network.