๐Ÿ›ฌLiving Off The Land Tools

Introduction

Living Off the Land (LOTL) Technique Resources for Cybersecurity Professionals Living off the land (LOTL) techniques leverage native tools and binaries, making them effective for both defense and adversarial strategies. Hereโ€™s a curated list of LOTL resources to enhance your security knowledge and defense strategies:

Different Living Off The Land Resources

1. GTFOBins ๐ŸŽฏ Curated list of Unix binaries that bypass security in misconfigured systems. ๐Ÿ”— https://lnkd.in/dpBaXDGB 2. LOLDrivers ๐ŸŽฏ Comprehensive catalog of Windows drivers exploited by attackers. ๐Ÿ”— https://www.loldrivers.io/ 3. LOLBAS (Living Off the Land Binaries and Scripts) ๐ŸŽฏ Documents binaries, scripts, and libraries used in LOTL techniques. ๐Ÿ”— https://lnkd.in/dFR2JK3y 4. LOLApps ๐ŸŽฏ Highlights built-in and third-party applications used for adversarial gain. ๐Ÿ”— https://lnkd.in/d-hXXvhv 5. LOLESXi ๐ŸŽฏ Catalog of VMware ESXi binaries/scripts leveraged in cyber operations. ๐Ÿ”— https://lnkd.in/dYZZ8BiG 6. LOOBins (macOS) ๐ŸŽฏ Details on macOS binaries that threat actors can exploit. ๐Ÿ”— https://www.loobins.io/ 7. LOLAD (Active Directory) ๐ŸŽฏ Techniques and commands for leveraging Active Directory in security operations. ๐Ÿ”— https://lnkd.in/d3eubf6m 8. LOTLWeb ๐ŸŽฏ Popular legitimate domains used by attackers for C&C, exfiltration, and downloads. ๐Ÿ”— https://lots-project.com/ 9. MalAPI ๐ŸŽฏ Maps Windows APIs to common malware techniques. ๐Ÿ”— https://malapi.io/ 10. FileExtension ๐ŸŽฏ Stay updated on file extensions commonly exploited by attackers. ๐Ÿ”— https://filesec.io/

Techniques

For more on LOTL and advanced security tactics: https://lnkd.in/djAEzVgb

LOTL Techniques: A Must-Know for Security Experts


REFERENCES

Last updated