Skip to content

Details

  • Introducing the commonly abused LOLBins.
  • Identifying malicious activities using the MITRE ATT&CK TTPs.
  • Detecting LOLBin attacks that:
  • Bypass security defenses
  • Bypass user access control
  • And conduct other fileless attacks

Members are also interested in