Repository navigation
lolbas
- Website
- Wikipedia
Search gtfobins and lolbas files from your terminal
Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Project/LOLBAS), WADComs (https://wadcoms.github.io), and HijackLibs (https://hijacklibs.net/).
A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.
Awesome list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers
Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.
Webscrapper written in python3 to show lolbas in a terminal.
A C2 server designed to run within Electron applications.
lowest-common denominator binaries
Powershell script that checks if a list of executables contains potential living of the land binaries or scripts.
Artifacts release of BLAKE3 hashes categorized by operating systems into the content hash, directory, file name, full path, and living-off-the-land (gtfobins, lolbas, & loobins) sets to create poppy blooms.
ssh.exe is available in windows 10 / server 2019 by default, let's LOLBAS it up!
Fileless malware for threat detection purposes.
Collection of LOL items from these popular opensource projects: LOLBAS, GTFOBins, WADComs, and PayloadAllTheThings
For educational and security research purposes only.
Fileless malware project for educational and research purposes only.
PoC 'fileless' hybrid malware that uses exploit CVE-2021-36934 (improper ACLs on shadow copies) including threat detection files. This repo is for educational and cybersecurity research purposes only.
Fileless ransomware simulation framework for detection and training. Explore attack chains and advanced tradecraft. Perfect for security research. 🛡️💻
Adversarial Prompt Engineering 3x model.
Windows 11 purple team exercise.
This repository, "Why-so-Serious-SAM," showcases a proof of concept for the HiveNightmare fileless exploit on Windows 11. 🐙 Dive into the details of fileless malware techniques and their implications for security. 🛡️