lolbins-ctidriven.vercel.app
Open in
urlscan Pro
76.76.21.164
Public Scan
URL:
https://lolbins-ctidriven.vercel.app/
Submission: On September 27 via manual from IL — Scanned from GB
Submission: On September 27 via manual from IL — Scanned from GB
Form analysis
0 forms found in the DOMText Content
Home LOLBins CTI-Driven Github Living-Off-the-Land Binaries Cyber Threat Intelligence Driven Certutil Bitsadmin Mshta Cscript Wscript PsExec WMIC Rundll32 Schtasks Regsvr32 Reg Tasklist At CMD PowerShell [MITRE ATT&CK: S0160] Certutil is a command-line utility that can be used to obtain certificate authority information and configure Certificate Services. An adversary may use [certutil] to: | Download files from a given URL | Base64 encode collected data | Decode binaries hidden inside certificate files as Base64 information | Install browser root certificates as a precursor to performing Adversary-in-the-Middle | STIX Visualizer JSON Crack Visualizer [MITRE ATT&CK: S0190] BITSAdmin is a command line tool used to create and manage BITS Jobs. An adversary may use [BITSAdmin] to: | Create BITS Jobs to launch a malicious process | Create BITS Jobs to upload files from a compromised host | Create BITS Jobs to upload and/or download files | Create BITS Jobs to upload and/or download files from SMB file servers | STIX Visualizer JSON Crack Visualizer [MITRE ATT&CK: T1218.005] Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted Windows utility. An adversary may use [Mshta] to: | Execute malicious payloads | Execute a malicious hta file | Executed malicious JavaScript code | Execute HTML pages | Execute malicious VBScript | Execute DLLs | Download and execute applications from a remote server | STIX Visualizer JSON Crack Visualizer Work in progress... Work in progress... Work in progress... Work in progress... Work in progress... Work in progress... Work in progress... Work in progress... Work in progress... Work in progress... Work in progress... Work in progress...