๐ฌLiving Off The Land Tools
Introduction
Living Off the Land (LOTL) Technique Resources for Cybersecurity Professionals Living off the land (LOTL) techniques leverage native tools and binaries, making them effective for both defense and adversarial strategies. Hereโs a curated list of LOTL resources to enhance your security knowledge and defense strategies:
Different Living Off The Land Resources
1. GTFOBins ๐ฏ Curated list of Unix binaries that bypass security in misconfigured systems. ๐ https://lnkd.in/dpBaXDGB 2. LOLDrivers ๐ฏ Comprehensive catalog of Windows drivers exploited by attackers. ๐ https://www.loldrivers.io/ 3. LOLBAS (Living Off the Land Binaries and Scripts) ๐ฏ Documents binaries, scripts, and libraries used in LOTL techniques. ๐ https://lnkd.in/dFR2JK3y 4. LOLApps ๐ฏ Highlights built-in and third-party applications used for adversarial gain. ๐ https://lnkd.in/d-hXXvhv 5. LOLESXi ๐ฏ Catalog of VMware ESXi binaries/scripts leveraged in cyber operations. ๐ https://lnkd.in/dYZZ8BiG 6. LOOBins (macOS) ๐ฏ Details on macOS binaries that threat actors can exploit. ๐ https://www.loobins.io/ 7. LOLAD (Active Directory) ๐ฏ Techniques and commands for leveraging Active Directory in security operations. ๐ https://lnkd.in/d3eubf6m 8. LOTLWeb ๐ฏ Popular legitimate domains used by attackers for C&C, exfiltration, and downloads. ๐ https://lots-project.com/ 9. MalAPI ๐ฏ Maps Windows APIs to common malware techniques. ๐ https://malapi.io/ 10. FileExtension ๐ฏ Stay updated on file extensions commonly exploited by attackers. ๐ https://filesec.io/
Techniques
For more on LOTL and advanced security tactics: https://lnkd.in/djAEzVgb
LOTL Techniques: A Must-Know for Security Experts
REFERENCES
Last updated