The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders understand how LOLBin binaries are used by threat actors during an intrusion in a graphical and digestible format for the TIPs platform using the STIX format.
☆130Apr 6, 2024Updated last year
Alternatives and similar repositories for LOLBins
Users that are interested in LOLBins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- A repository of my own Sigma detection rules.☆164Nov 25, 2025Updated 4 months ago
- An opensource sigma conversion tool built using pysigma☆163Updated this week
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆92Nov 3, 2025Updated 4 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- MISP Playbooks☆223Oct 14, 2025Updated 5 months ago
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 10 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- A series of cloud focused KQL queries for threat hunting and DFIR☆11Oct 21, 2025Updated 5 months ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆79Mar 17, 2026Updated last week
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆383Dec 9, 2022Updated 3 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- Signatures and IoCs from public Volexity blog posts.☆366Dec 4, 2025Updated 3 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Jul 19, 2023Updated 2 years ago
- EDRSandblast-GodFault☆271Aug 28, 2023Updated 2 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 8 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆118Jan 22, 2026Updated 2 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Apr 30, 2024Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ASR Configurator, Essentials and Atomic Testing☆104Apr 14, 2025Updated 11 months ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated 2 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆515Feb 16, 2026Updated last month
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- The most average C2 ever (MACE)☆97Apr 9, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A ProcessMonitor visualization application written in rust.☆184Aug 6, 2023Updated 2 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 5 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆722Nov 14, 2025Updated 4 months ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago