API Browser

Explore 50+ weaponized APIs with abuse scenarios and detection strategies

Showing 29 of 29 APIs

System.Diagnostics.Process.Start

Critical

Execute arbitrary commands via .NET process execution

Category: Windows .NET
View Details →

WMI Win32_Process.Create

Critical

Create processes via WMI for command execution

Category: Windows COM
View Details →

Reflection.Assembly.Load

High

Load arbitrary .NET assemblies for code execution

Category: Windows .NET
View Details →

HttpClient.GetAsync

High

Download files and execute remote payloads

Category: Windows .NET
View Details →

VirtualAllocEx

High

Allocate memory in remote process for code injection

Category: Native APIs
View Details →

Chrome Extension - storage.sync API

Critical

Steal OAuth tokens from browser storage

Category: Browser Extension
View Details →

System.Net.ServicePointManager.ServerCertificateValidationCallback

High

SSL certificate bypass

Category: Windows Dotnet Api
View Details →

AWS EC2 Metadata Service

Critical

Access 169.254.169.254 to steal temporary credentials

Category: Cloud Metadata
View Details →

LoadLibraryA/W

High

Load DLL libraries in process memory

Category: Native APIs
View Details →

RegSetValueEx

High

Write values to Windows Registry for persistence

Category: Native APIs
View Details →

user32.dll - SetWindowsHookEx

High

Install system-wide hooks for keylogging/monitoring

Category: Native APIs
View Details →

OpenProcess+ReadProcessMemory

High

Read sensitive data from remote process memory

Category: Native APIs
View Details →

MethodInfo.Invoke

High

Invoke methods dynamically via .NET reflection

Category: Windows .NET
View Details →

SmtpClient

Medium

Send emails for C2 communication or data exfiltration

Category: Windows .NET
View Details →

NamedPipeClientStream

High

Create named pipes for inter-process communication

Category: Windows .NET
View Details →

EventLog.WriteEntry

Medium

Write entries to Windows Event Log for evasion

Category: Windows .NET
View Details →

WebClient.DownloadString

High

Download remote scripts and payloads

Category: Windows .NET
View Details →

access.Application COM Object

High

Create Access database for code execution

Category: Windows COM
View Details →

Shell.Application

High

Execute commands via COM shell interface

Category: Windows COM
View Details →

Registry.CreateSubKey

High

Create registry keys for persistence

Category: Windows .NET
View Details →

Scripting.FileSystemObject

Medium

File system operations via COM scripting

Category: Windows COM
View Details →

WScript.Shell

Critical

Execute shell commands via Windows Script Host

Category: Windows COM
View Details →

MSXML.XMLHTTP

High

Download files via XML HTTP requests

Category: Windows COM
View Details →

Outlook.Application

Medium

Access Outlook for data theft or spam campaigns

Category: Windows COM
View Details →

PowerShell Reflection

Critical

Execute code via PowerShell reflection API

Category: Script Engines
View Details →

WMI DCOM

Critical

Remote command execution via DCOM/WMI

Category: Script Engines
View Details →

Access.Application

High

Code execution through Access macro execution

Category: Script Engines
View Details →

HttpWebRequest

High

Download payloads over HTTPS

Category: Windows .NET
View Details →

WriteProcessMemory

Critical

Write shellcode into remote process memory

Category: Native APIs
View Details →