Pentester's Promiscuous Notebook
search
Ctrlk
TwitterGitHubBlog
  • README
  • ⚒️Pentest
    • C2chevron-right
    • Infrastructurechevron-right
    • OSINTchevron-right
    • Password Brute Forcechevron-right
    • Perimeterchevron-right
    • Shellschevron-right
    • Webchevron-right
    • Wi-Fichevron-right
  • ⚔️Red Team
    • Basics
    • Infrastructure
    • Developmentchevron-right
      • API Hashing
      • API Hooking
      • BOF / COFF
      • CFG
      • Code Injectionchevron-right
      • DLL Hijacking
      • Golang
      • Kernel Mode
      • PIC / Shellcode
      • Nim
      • Sandbox Evasion
      • Syscalls
      • Windows API
  • 🐞Exploit Dev
    • BOFchevron-right
    • RE
    • WinDbg
  • ⚙️Admin
    • Git
    • Linuxchevron-right
    • Networkingchevron-right
    • Virtualizationchevron-right
    • Windows
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ⚔️Red Teamchevron-right
  2. Development

Windows API

  • https://yuval0x92.wordpress.com/2020/03/09/native-api-win32-api/arrow-up-right

  • https://github.com/EspressoCake/NativeFunctionStaticMap/blob/main/Native_API_Resolve.pdfarrow-up-right

  • https://github.com/LloydLabs/Windows-API-Hashingarrow-up-right

  • https://github.com/MohitDabas/malwinxarrow-up-right

  • https://fourcore.io/blogs/how-a-windows-process-is-created-part-1arrow-up-right

  • https://fourcore.io/blogs/how-a-windows-process-is-created-part-2arrow-up-right

hashtag
Tools

  • https://github.com/MalwareApiLib/MalwareApiLibraryarrow-up-right

  • https://www.leeholmes.com/managing-ini-files-with-powershell/arrow-up-right

Last updated 1 year ago