UltimateAppLockerByPassList
LOLBAS
UltimateAppLockerByPassList | LOLBAS | |
---|---|---|
4 | 5 | |
1,816 | 6,609 | |
- | 1.2% | |
2.1 | 8.3 | |
8 months ago | 12 days ago | |
PowerShell | XSLT | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
UltimateAppLockerByPassList
-
AppLocker - Deny vs Allow and Except
Check out the Ultimate AppLocker Bypass list and add those https://github.com/api0cradle/UltimateAppLockerByPassList
-
FSRM saved our asses
Too bad it's trivial to bypass. My favorite bypass is through alternate data streams, which Applocker is unaware of.
-
What group policy rule should ever network have?
Remember to block these writable paths in under c:\Windows: https://github.com/api0cradle/UltimateAppLockerByPassList/blob/master/Generic-AppLockerbypasses.md
- Safe powershell
LOLBAS
-
How do i replicate GTFOBins layout ?
I have an idea for a simar style website that i would like to create, and i was going to use GTFOBins as a template and ammend to fit my data, much like LOLBAS has.
-
should we write our own custom rule
Fo example the usage of living off the land binaries https://lolbas-project.github.io/ , when I've implemented rules in order to detect this ,I've seen a lot of false positive because of the context ,but the rule was correct.
- Living Off the Land Binaries
-
Lolbas: Living Off the Land Binaries, Scripts and Libraries
https://github.com/LOLBAS-Project/LOLBAS/tree/master
The associated github is much more informative about what the project does. Basically they document "undocumented" capabilities of signed microsoft binaries that can be used for red team work.
-
CISA bulletin – PRC state-sponsored cyber actor techniques [pdf]
Yes, see for example [1].
[1] https://github.com/LOLBAS-Project/LOLBAS
What are some alternatives?
HardeningKitty - HardeningKitty - Checks and hardens your Windows configuration
GoodHound - Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.
AaronLocker - Robust and practical application control for Windows
purple-team-exercise-framework - Purple Team Exercise Framework
CryptoBlocker - A script to deploy File Server Resource Manager and associated scripts to block infected users
gitlab-watchman - Finding exposed secrets and personal data in GitLab
slack-watchman - Slack enumeration and exposed secrets detection tool
PWF - Practical Windows Forensics Training
LOLDrivers - Living Off The Land Drivers
cobalt-arsenal - My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+
LOOBins - Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" macOS binaries and how they can be used by threat actors for malicious purposes.