A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.
☆121Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for windows-api-function-cheatsheets
Users that are interested in windows-api-function-cheatsheets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,460Oct 4, 2024Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆36Oct 31, 2023Updated 2 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆27Aug 28, 2025Updated 7 months ago
- Collection of red team techniques.☆70Apr 25, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆33Apr 7, 2020Updated 6 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 11 months ago
- Websocket communications with Push and Poll messages☆20Oct 26, 2025Updated 5 months ago
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83May 23, 2023Updated 2 years ago
- ☆111Feb 17, 2025Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- Top hashpwn rules☆20Dec 12, 2025Updated 4 months ago
- Use hardware breakpoint to dynamically change SSN in run-time☆281Apr 10, 2024Updated 2 years ago
- HookChain: A new perspective for Bypassing EDR Solutions☆596Jan 5, 2025Updated last year
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year
- ☆59Nov 13, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆15Aug 17, 2023Updated 2 years ago
- Extract entire function source code based on giving line number using Javaparser☆21Jul 15, 2025Updated 9 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆591Jun 12, 2024Updated last year
- A small NtCreateUserProcess PoC that spawns a Command prompt.☆104Apr 11, 2026Updated last week
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- ☆137Jan 8, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆288Jan 21, 2024Updated 2 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- maldev obviously☆28May 5, 2025Updated 11 months ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆39Updated this week
- AV/EDR killer using BYOVD technique☆44Sep 27, 2024Updated last year
- Bypassing Amsi using LdrLoadDll☆48Jan 8, 2025Updated last year