A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.
☆1,470Oct 4, 2024Updated last year
Alternatives and similar repositories for windows-api-function-cheatsheets
Users that are interested in windows-api-function-cheatsheets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆121Nov 22, 2023Updated 2 years ago
- EDR Lab for Experimentation Purposes☆1,448Mar 1, 2026Updated 2 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆799Jan 26, 2026Updated 3 months ago
- Simulate the behavior of AV/EDR for malware development training.☆567Feb 15, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This map lists the essential techniques to bypass anti-virus and EDR☆3,255Mar 28, 2025Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,454Apr 9, 2026Updated last month
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆412Jan 11, 2026Updated 4 months ago
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,494May 5, 2026Updated 2 weeks ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆550Feb 13, 2024Updated 2 years ago
- RunPE implementation with multiple evasive techniques (1)☆388Sep 22, 2023Updated 2 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆450May 22, 2025Updated 11 months ago
- A self-hosted sandbox for red teams to test payloads against modern detection before deployment. MCP integration lets an LLM agent drive …☆1,420May 5, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆764Jan 26, 2025Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,389Oct 27, 2023Updated 2 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,256Dec 11, 2023Updated 2 years ago
- A modern 32/64-bit position independent implant template☆1,333Mar 21, 2025Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆595Jun 12, 2024Updated last year
- Windows Local Privilege Escalation Cookbook☆1,321Feb 5, 2026Updated 3 months ago
- Win32 and Kernel abusing techniques for pentesters☆978Sep 3, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,026Jan 7, 2026Updated 4 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆602Aug 2, 2025Updated 9 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Because AV evasion should be easy.☆872Nov 28, 2024Updated last year
- A BOF that runs unmanaged PEs inline☆700Oct 23, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆644May 8, 2025Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆327Apr 12, 2024Updated 2 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,528Jan 26, 2026Updated 3 months ago
- Analyse your malware to surgically obfuscate it☆530Dec 17, 2025Updated 5 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆760May 23, 2025Updated 11 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆735May 7, 2025Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆603Jan 5, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Hardcore Debugging☆938Apr 9, 2026Updated last month
- RustRedOps is a repository for advanced Red Team techniques focused on Rust☆1,874Dec 29, 2025Updated 4 months ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,015Jun 4, 2024Updated last year
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,327Feb 15, 2026Updated 3 months ago
- Collect Windows telemetry for Maldev☆477Updated this week
- Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!☆555May 9, 2025Updated last year