lolbins-ctidriven.vercel.app Open in urlscan Pro
76.76.21.164  Public Scan

URL: https://lolbins-ctidriven.vercel.app/
Submission: On September 27 via manual from IL — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

Home LOLBins CTI-Driven Github


Living-Off-the-Land Binaries Cyber Threat Intelligence Driven

Certutil Bitsadmin Mshta Cscript Wscript PsExec WMIC Rundll32 Schtasks Regsvr32
Reg Tasklist At CMD PowerShell
[MITRE ATT&CK: S0160]

Certutil is a command-line utility that can be used to obtain certificate
authority information and configure Certificate Services.

An adversary may use [certutil] to:
| Download files from a given URL | Base64 encode collected data | Decode
binaries hidden inside certificate files as Base64 information | Install browser
root certificates as a precursor to performing Adversary-in-the-Middle |

STIX Visualizer JSON Crack Visualizer


[MITRE ATT&CK: S0190]

BITSAdmin is a command line tool used to create and manage BITS Jobs.

An adversary may use [BITSAdmin] to:
| Create BITS Jobs to launch a malicious process | Create BITS Jobs to upload
files from a compromised host | Create BITS Jobs to upload and/or download files
| Create BITS Jobs to upload and/or download files from SMB file servers |

STIX Visualizer JSON Crack Visualizer


[MITRE ATT&CK: T1218.005]

Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and
Javascript or VBScript through a trusted Windows utility.

An adversary may use [Mshta] to:
| Execute malicious payloads | Execute a malicious hta file | Executed malicious
JavaScript code | Execute HTML pages | Execute malicious VBScript | Execute DLLs
| Download and execute applications from a remote server |

STIX Visualizer JSON Crack Visualizer


Work in progress...
Work in progress...
Work in progress...
Work in progress...
Work in progress...
Work in progress...
Work in progress...
Work in progress...
Work in progress...
Work in progress...
Work in progress...
Work in progress...