This repository documents real-world forensic triage cases involving the abuse of legitimate Windows binaries—also known as LOLBins—for malicious purposes.
-
Updated
May 7, 2025 - Jupyter Notebook
This repository documents real-world forensic triage cases involving the abuse of legitimate Windows binaries—also known as LOLBins—for malicious purposes.
This case study analyzed a stealthy host-based compromise in which the attacker exploited the trusted Windows binary mshta.exe to execute a remotely hosted, obfuscated JavaScript payload. The attacker’s strategy was notable not for brute force or privilege escalation, but for quiet persistence and clever abuse of native system behavior.
Add a description, image, and links to the cybersecurity-triage topic page so that developers can more easily learn about it.
To associate your repository with the cybersecurity-triage topic, visit your repo's landing page and select "manage topics."