A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.
☆121Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for windows-api-function-cheatsheets
Users that are interested in windows-api-function-cheatsheets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,466Oct 4, 2024Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆36Oct 31, 2023Updated 2 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆27Aug 28, 2025Updated 8 months ago
- Collection of red team techniques.☆70Apr 25, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆33Apr 7, 2020Updated 6 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 11 months ago
- Websocket communications with Push and Poll messages☆20Oct 26, 2025Updated 6 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83May 23, 2023Updated 2 years ago
- ☆111Feb 17, 2025Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆26Mar 19, 2026Updated last month
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- Use hardware breakpoint to dynamically change SSN in run-time☆281Apr 10, 2024Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆97Dec 24, 2024Updated last year
- HookChain: A new perspective for Bypassing EDR Solutions☆603Jan 5, 2025Updated last year
- ☆59Nov 13, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆15Aug 17, 2023Updated 2 years ago
- A small NtCreateUserProcess PoC that spawns a Command prompt.☆106Apr 11, 2026Updated 3 weeks ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆596Jun 12, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- Extract entire function source code based on giving line number using Javaparser☆21Jul 15, 2025Updated 9 months ago
- List of tools to use in the Advance Red Team Operations course from White Knight Labs☆13Dec 22, 2024Updated last year
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆290Jan 21, 2024Updated 2 years ago
- maldev obviously☆28May 5, 2025Updated last year
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆39May 1, 2026Updated last week
- AV/EDR killer using BYOVD technique☆45Sep 27, 2024Updated last year
- ☆246May 5, 2024Updated 2 years ago