For more info on the project, click on the logo.
If you want to contribute, check out our contribution guide. Our criteria list sets out what we define as a LOLBin/Script/Lib. More information on programmatically accesssing this project can be found on the API page.
MITRE ATT&CK® and ATT&CK® are registered trademarks of The MITRE Corporation. You can see the current ATT&CK® mapping of this project on the ATT&CK® Navigator.
If you are looking for UNIX binaries, please visit gtfobins.github.io.
If you are looking for drivers, please visit loldrivers.io.
https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/dll-hijacking
A little tool to play with Windows security. Contribute to gentilkiwi/mimikatz development by creating an account on GitHub.
https://www.mandiant.com/resources/blog/commando-vm-windows-offensive-distribution
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs. - GitHub - Yamato-Security/hayabusa: Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Man kann den Reboot umgehen, indem man das Kerberos-Ticket für den Computer mit klist.exe erneuert.
Portqry.exe is a command-line utility that you can use to help troubleshoot TCP/IP connectivity issues. The utility reports the port status of TCP and UDP ports on a computer that you select.
Want to run Podman on Windows 10? You can, thanks to the latest Windows Subsystem for Linux (WSL) 2.0 implementation.
From enabling file extensions to speeding up the shutdown process, there are many ways to improve Windows 10's performance and usability.
Last week, Microsoft released PowerToys, a new project which seeks to add extra productivity features to the Windows desktop. PowerToys will encompass a suite of utilities aimed at power users and …
Diff tool for file and folder comparison