hunting-living-off-the-land-binaries

Installation
SKILL.md

Hunting Living Off The Land Binaries

Instructions

Detect LOLBAS abuse by analyzing Windows process creation events (Event ID 4688 / Sysmon 1) and matching command lines against known malicious patterns from the LOLBAS project.

import json
import requests

# Fetch LOLBAS database
resp = requests.get("https://lolbas-project.github.io/api/lolbas.json")
lolbas_db = resp.json()

# Extract binary names and suspicious commands
for entry in lolbas_db:
    print(entry["Name"], [cmd["Command"] for cmd in entry.get("Commands", [])])

Key detection patterns:

  1. certutil -urlcache -split -f (download)
  2. mshta vbscript:Execute (script execution)
  3. regsvr32 /s /n /u /i:http (squiblydoo)
  4. rundll32 javascript: (script execution)
  5. wmic process call create (process creation)
  6. bitsadmin /transfer (download)

Examples

# Match Sysmon Event ID 1 against LOLBAS patterns
import Evtx.Evtx as evtx
with evtx.Evtx("Microsoft-Windows-Sysmon.evtx") as log:
    for record in log.records():
        xml = record.xml()
        if "certutil" in xml.lower() and "urlcache" in xml.lower():
            print(f"LOLBAS detected: {xml}")
Related skills
Installs
2
GitHub Stars
6.1K
First Seen
Mar 17, 2026