SkillAgentSearch skills...

WindowsAPIAbuseAtlas

A living guide to lesser-known and evasive Windows API abuses used in malware, with practical reverse engineering notes, YARA detections, and behavioral indicators.

Install / Use

/learn @danafaye/WindowsAPIAbuseAtlas
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

<img style="float:right" src="atlas.png" width="35%"/>

Windows API Abuse Atlas

WindowsAPIAbuseAtlas is an evolving map of the sneaky and lesser-known ways malware twists Windows APIs to hide, evade, and attack. It’s packed with practical reverse engineering insights, ready-to-use YARA rules, and clear behavioral clues that help defenders spot these tricks in the wild. Whether you’re hunting threats, building detections, or just curious about how bad actors operate behind the scenes, this atlas sheds light on complex Windows behavior ... empowering the cyber community to stay one step ahead.

Index

This is a living roadmap. As I knock out each entry, I’ll link it here, and I might add new ones along the way. If you don’t see a link yet, it’s either a placeholder for something I plan to write, or just an API that’s on the radar.

ADVAPI32.DLL

AMSI.DLL

DBGHELP

DNSAPI.DLL

FWPUCLNT.DLL

  • FwpmCalloutAdd
  • FwpmCalloutRegister
  • FwpmEngineOpen
  • FwpmFilterAdd
  • FwpIpsecRoutine0

KERNEL32.DLL

MPR.DLL

NETAPI32.DLL

NTDLL.DLL

OLE32.DLL

PSAPI.DLL

RASAPI32.DLL

SETUPAPI.DLL

SHELL32.DLL

UIAUTOMATIONCORE

URLMON.DLL

USER32.DLL

WINHTTP.DLL

WINSTA.DLL

View on GitHub
GitHub Stars94
CategoryDevelopment
Updated13d ago
Forks10

Languages

YARA

Security Score

95/100

Audited on Mar 26, 2026

No findings