Skip to content

danzek/awesome-lol

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Awesome LOL Awesome

Living off the Land (LOL) attack techniques, tools, and defender resources.

Living off the land (LOL/LoTL) is an attack strategy where adversaries abuse tools and features commonly present in the target environment to blend in with normal activity and evade detection.

Contents

Cloud & App

  • Azure IP Lookup - Maps IPs and domains to Azure service tags, regions, and data centers; useful for identifying when Azure services are abused to masquerade as legitimate Microsoft traffic.
  • Entra ID First Party Apps & Scope Browser - First-party applications including their pre-consented permissions in Microsoft Entra ID, apps vulnerable to ConsentFix/AuthCodeFix, and those with default exceptions from conditional access policies.
  • Hacking the Cloud - Encyclopedia of attacks/tactics/techniques for cloud exploitation.
  • LOLAPI - Real-world abused APIs across Windows, Cloud, and Browser platforms with detection strategies, mitigation guidance, and red team POCs.
  • LOLAPPS - Living Off The Land Applications, including built-in and third-party applications.
  • LOLFSaaS - Free-tier SaaS platforms documented for abuse surface, OPSEC profiles, detection logic, and C2 framework mappings.
  • Microsoft 365 Application IDs – BEC Investigation Resources - Reference for application IDs commonly abused in M365.
  • Microsoft Graph Permissions Explorer - Reference for Microsoft Graph permissions, mapping each to the APIs and data objects exposed, useful for assessing abuse potential of app registrations and OAuth grants.
  • RogueApps - OIDC/OAuth 2.0 applications that are often abused and used maliciously.
  • TrailDiscover - Repository of AWS CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references, and security implications.

Endpoint

  • Argument Injection Vectors - Intended features of legitimate programs exploitable as argument injection vectors.
  • Bootloaders.io - Known malicious bootloaders for various operating systems.
  • BYOL - Bring Your Own Land (BYOL): Executing custom C#-based assemblies entirely within memory to reduce reliance on tools present on the target system.
  • Evasion Techniques - Encyclopedia of evasion and anti-debug techniques.
  • Filesec.io - File extensions being used by attackers, tagged by function and operating system.
  • GTFOArgs - Unix binaries that can be manipulated for argument injection, possibly resulting in security vulnerabilities.
  • GTFOBins - Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
  • HijackLibs - DLL hijacking candidates mapping vulnerable executables to abusable DLLs, with Sigma detection rules for defenders.
  • lcdbins - Collection of oneliners that use lowest-common denominator binaries (lcdbins) present on most UNIX-based operating systems to perform enumeration and post-exploitation activities.
  • LOFLCAB - Living off the Foreign Land Cmdlets and Binaries (cmdlets, binaries, scripts, and WMI classes).
  • LOLAD - Catalog of Active Directory techniques, commands, and functions that attackers can abuse.
  • LOLBAS - Living Off The Land Binaries, Scripts and Libraries.
  • LOLBins CTI-Driven - Maps threat actor LOLBin usage during intrusions into graphical, STIX-formatted data for threat intelligence platforms.
  • LOLBins Reference - Interactive reference for Windows and Linux LOLBins with a dynamic payload builder, ATT&CK mapping, and auto-updates from official sources.
  • LOLDrivers - Windows drivers used by adversaries to bypass security controls and carry out attacks.
  • LOLESXi - Binaries/scripts natively available in VMware ESXi that adversaries have utilized.
  • LOLGlobs - Glob-based command obfuscation techniques for Linux, macOS, Windows CMD, and PowerShell used to bypass signature-based detection in AV, EDR, and WAF products.
  • LOLRMM - Remote Monitoring and Management (RMM) tools that could be abused by threat actors.
  • LOOBins - Living Off the Orchard (LOO): Built-in macOS binaries that can be abused by attackers, with detailed usage information.
  • LOTHardware - Catalog of hardware and devices commonly abused by attackers.
  • MalAPI.io - Maps Windows APIs to common techniques used by malware.
  • Persistence Info - Windows persistence mechanisms including registry keys, scheduled tasks, services, and DLLs, with detection and protection guidance.
  • Sploitify - Interactive cheat sheet of public server-side exploits, searchable by product.
  • WADComs - Interactive cheat sheet with offensive security tools and their respective commands to be used against Windows / Active Directory environments.
  • WTFBins - Benign applications that exhibit suspicious behavior, generating noise and false positives in threat hunting and automated detections.

Network

  • Awesome Tunneling - Tunneling software and services, including self-hosted alternatives to ngrok and Cloudflare Tunnel, commonly abused for C2 and exfiltration.
  • LOLC2 - C2 frameworks that leverage legitimate services to evade detection.
  • LOLEXFIL - Data exfiltration reference covering LOLBins, RMM tools, cloud storage, tunneling protocols, and more, each with detection patterns, simulation commands, DFIR artifacts, IOCs, and ATT&CK mappings.
  • LOTS Project - Living Off Trusted Sites: Legitimate popular domains abused for phishing, C2, exfiltration, and tool delivery to evade detection.
  • LOTTunnels - Living Off the Tunnels: Legitimate tunneling services abused for exfiltration, persistence, and shell access.
  • LoTWH - Living Off The Webhooks: Webhook services abused for data exfiltration and C2 communications.

Software Supply Chain

  • LoLCerts - Living Off The Leaked Certificates: Code signing certificates known to have been leaked or stolen, then abused by threat actors.
  • LOTP - Living Off the Pipeline: Inventories how development tools (typically CLIs) commonly used in CI/CD pipelines have lesser-known RCE-By-Design features ("foot guns").

SecOps

  • LoFP - Living off the False Positive: Autogenerated collection of false positives sourced from popular rule sets.
  • Project LOST - Living Off Security Tools: Security tools used by adversaries to bypass security controls and carry out attacks.

Releases

No releases published

Packages

 
 
 

Contributors