A comprehensive, interactive reference for Living off the Land Binaries (LOLBins) for Windows (LOLBAS) and Linux (GTFOBins).
- π 600+ LOLBins - Windows (LOLBAS) + Linux (GTFOBins) binaries
- π Auto-Update - Script to fetch latest data from official sources
- π― Payload Builder - Real-time LHOST/LPORT replacement in commands
- π Real-time Search - Quickly find binaries by name, description, or technique
- π·οΈ Category Filters - Filter by Shell, Execute, File Read/Write, RevShell, and more
- π One-Click Copy - Copy commands to clipboard instantly
- π― MITRE ATT&CK Mapping - Each binary mapped to MITRE techniques
- π‘οΈ Detection Tips - Blue team guidance for each technique
- π± Responsive Design - Works on desktop and mobile
- π Dark Theme - Easy on the eyes during late-night pentests
Visit: https://Ilias1988.github.io/LOLBins-Reference
| Category | Description |
|---|---|
| β‘ Execute | Code/command execution |
| π₯ Download | File download capabilities |
| π‘οΈ UAC Bypass | UAC bypass techniques |
| π« AWL Bypass | Application whitelist bypass |
| π¨ Compile | Code compilation |
| π Encode | Encoding/decoding |
| Category | Description |
|---|---|
| π Shell | Spawn interactive shells |
| β‘ Execute | Command execution |
| π File Read | Read arbitrary files |
| βοΈ File Write | Write arbitrary files |
| π RevShell | Reverse shell capabilities |
- Fork this repository
- Go to Settings β Pages
- Set source to "main" branch
- Your site will be available at
https://Ilias1988.github.io/LOLBins-Reference
# Clone the repository
git clone https://github.com/Ilias1988/LOLBins-Reference.git
cd LOLBins-Reference
# Open in browser
start index.html # Windows
open index.html # macOS
xdg-open index.html # Linux
# Or use Python's built-in server
python -m http.server 8080
# Visit http://localhost:8080Keep your database up-to-date with the latest binaries from official sources!
pip install -r requirements.txt# 1. Clone GTFOBins repository (required for Linux binaries)
git clone https://github.com/GTFOBins/GTFOBins.github.io.git
# 2. Run the update script
python update_db.py- πͺ Windows: Downloads LOLBAS data directly from GitHub (no clone needed)
- π§ Linux: Parses GTFOBins from the cloned repository
- π Output: Generates
js/data.jswith all binaries
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β π§ LOLBins Reference - Database Updater β
β Updates from LOLBAS & GTFOBins official repositories β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
π§ [Linux] Checking local folder: GTFOBins.github.io/_gtfobins
β³ Found 450 files. Parsing...
β
[Linux] Success! Parsed 449 binaries from disk.
πͺ [Windows] Downloading LOLBAS Repository...
β³ Found 230 YAML files. Parsing...
β
[Windows] Success! Parsed 230 binaries from web.
π DATABASE UPDATE COMPLETE!
π Statistics:
β’ Windows (LOLBAS): 230 binaries
β’ Linux (GTFOBins): 449 binaries
β’ Total: 679 binaries
The Payload Builder feature allows you to customize IP and Port in all commands:
- Enter your LHOST (attacker IP) in the config bar
- Enter your LPORT (listening port) in the config bar
- All commands automatically update with your values!
Replaced placeholders:
- IPs:
ATTACKER_IP,127.0.0.1,192.168.x.x,10.x.x.x - Ports:
4444,1337,8080,9001
- Select OS - Click on Windows πͺ or Linux π§ tab
- Set Payload Config - Enter your LHOST/LPORT
- Filter by Category - Click category buttons to filter
- Search - Type in the search bar (or press
/to focus) - View Details - Click on any card to see full details
- Copy Commands - Click the copy button to copy commands
| Key | Action |
|---|---|
/ |
Focus search bar |
Escape |
Close modal |
- LOLBAS Project - Living Off The Land Binaries, Scripts and Libraries
- GTFOBins - Unix binaries that can be exploited
- MITRE ATT&CK - Adversary tactics and techniques
A curated collection of related "Living off the Land" and security research projects, accessible via the π Resources button in the header:
| Name | Platform | Description | URL |
|---|---|---|---|
| LOOBins | π macOS | Living Off the Orchard: macOS binaries used by threat actors | loobins.io |
| LOLDrivers | πͺ Windows | Drivers used by adversaries to bypass security controls | loldrivers.io |
| LOTS Project | π Web | Living Off Trusted Sites: Domains abused for phishing/C2 | lots-project.com |
| WTFBins | π€ Analysis | Benign apps that exhibit suspicious behaviors | wtfbins.essh.moe |
| Hijack Libs | π DLL | Curated list of DLL Hijacking candidates | hijacklibs.net |
| Filesec | π Files | File extensions being weaponized by attackers | filesec.io |
LOLBins-Reference/
βββ index.html # Main HTML file
βββ update_db.py # Database update script
βββ requirements.txt # Python dependencies
βββ README.md # This file
βββ LICENSE # MIT License
βββ .gitignore # Git ignore rules
βββ css/
β βββ style.css # Styles
βββ js/
βββ app.js # Application logic
βββ data.js # LOLBins database (auto-generated)
This tool is intended for educational purposes and authorized security testing only.
The techniques documented here can be used for:
- β Penetration testing (with authorization)
- β Red team exercises
- β Security research and education
- β Blue team defense preparation
Do NOT use these techniques for unauthorized access to systems.
Contributions are welcome!
- Fork the repository
- Create your feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
- LOLBAS Project maintainers
- GTFOBins maintainers
- The security research community
Made with β€οΈ for the Security Community
