lolol.farm
Digital shed for Living Off the Land resources
0 results
lolol logo

Living Off the Living Off the Land

Centralized farming resources to thrive off the land

Tip: try “windows”, “macos”, “dll”, “c2”, “persistence”
LoFP logo

LoFP

Living off the False Positive is an autogenerated collection of false positives sourced from some of the most popular rule sets. The information is categorized along with ATT&CK techniques, rule source, and data source.
LOLDrivers logo

LOLDrivers

Living Off The Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks.
GTFOBins logo

GTFOBins

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
LOLBAS logo

LOLBAS

The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques.
LOTS logo

LOTS Project

Attackers are using popular legitimate domains when conducting phishing, C&C, exfiltration and downloading tools to evade detection. The list of websites below allow attackers to use their domain or subdomain.
FileSec logo

FileSec

File extensions being used by attackers.
MalAPI logo

MalAPI.io

MalAPI.io maps Windows APIs to common techniques used by malware.
HijackLibs logo

HijackLibs

This project provides an curated list of DLL Hijacking candidates.
WADComs logo

WADComs

WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
LOOBins logo

LOOBins

Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in macOS binaries and how they can be used by threat actors for malicious purposes.
LOLApps logo

LOLApps

This project was made because exploitation isn't limited to binaries using command line techniques. Both built-in and third-party applications have been used & abused for adversarial gain since the dawn of time, and knowing these methods can help when all else fail.
Bootloaders logo

Bootloaders

Curated list of known malicious bootloaders for various operating systems. The project aims to assist security professionals in staying informed and mitigating potential threats associated with bootloaders.
Living Off The Hardware logo

Living Off The Hardware

Living Off The Hardware is a resource collection that provides guidance on identifying and utilizing malicious hardware and malicious devices.
WTFBins logo

WTFBins

WTFBin is a binary that behaves exactly like malware, except, somehow, it's not.
LOFL logo

LOFL Project

Living Off the Foreign Land (LOFL) are LOFL Cmdlets and Binaries (LOFLCABs) that are capable of performing activities from the local (Offensive Windows) system to a REMOTE system.
Persistence Info logo

Persistence Info

This contains information about Windows persistence mechanisms to make the protection/detection more efficient.
GitHub logo

lolcerts

Threat actors are known to sign their malware using stolen, or even legally acquired, code signing certificates. This project aims at collecting the details of the certificates that are known to be abused in the wild by malicious actors.
GitHub logo

LOTP

Inventory how development tools (typically CLIs), commonly used in CI/CD pipelines, have lesser-known RCE-By-Design features ("foot guns"), or more generally, can be used to achieve arbitrary code execution by running on untrusted code changes or following a workflow injection.
lolbins-cti logo

lolbins-cti driven

This project aims to help cyber defenders understand how LOLBin binaries are used by threat actors during an intrusion in a graphical and digestible format.
LOLESXi logo

LOLESXi

This project features a comprehensive list of binaries/scripts natively available in VMware ESXi that adversaries have utilised in their operations.
LOLRMM logo

LOLRMM

This project is a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.
LOT Webhooks logo

LOT Webhooks

This project is a community-driven project documenting webhooks that may be exploited for data exfiltration and C2 communications.
GitHub logo

Project-Lost

This project is a curated list of Security Tools used by adversaries to bypass security controls and carry out attacks.
LOT Tunnels logo

LOT Tunnels

This project is a community driven project to document digital tunnels that can be abused by threat actors as well by insiders for data exfiltrations, persistence, shell access etc.
LOLAD logo

LOLAD

This project provides a comprehensive collection of Active Directory techniques, commands, and functions that can be used natively to support offensive security operations and Red Team exercises.
LOLC2 logo

LOLC2

This project provides a collection of C2 frameworks that leverage legitimate services to evade detection.
LOLAPI logo

LOLAPI

Real-world abused APIs across Windows, Cloud, and Browser platforms—with detection strategies, mitigation guidance, and red team POCs.
A project by @brok3ns0undbr0k3nlab