PaddyCahil / windows-api-function-cheatsheetsLinks
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.
☆113Updated 2 years ago
Alternatives and similar repositories for windows-api-function-cheatsheets
Users that are interested in windows-api-function-cheatsheets are comparing it to the libraries listed below
Sorting:
- ☆40Updated last year
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆281Updated last year
- Windows Persistence IT-Security☆108Updated 9 months ago
- This repository implements Threadless Injection in C☆173Updated last year
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆145Updated last year
- Payload encoding utility to effectively lower payload entropy.☆119Updated 8 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆169Updated last year
- ☆146Updated last year
- Sleep obfuscation☆252Updated last year
- Create Anti-Copy DRM Malware☆70Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆234Updated last year
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆252Updated 2 months ago
- ☆163Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆117Updated 6 months ago
- Windows rootkit designed to work with BYOVD exploits☆211Updated 10 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆88Updated 2 years ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆97Updated 5 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆201Updated last year
- ☆259Updated last year
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆78Updated last year
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆146Updated 8 months ago
- Basic interactive Windows kernel offensive toolkit written in C☆133Updated 2 months ago
- Local & remote Windows DLL Proxying☆169Updated last year
- ☆40Updated 11 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288Updated last year
- Memory Obfuscation in Rust☆268Updated 2 weeks ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆155Updated 3 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆87Updated 9 months ago
- Remote Shellcode Injector☆220Updated 2 years ago