Welcome to Living Off the Land Techniques — where I collected devious-but-delightful tactics used by real adversaries to blend in like a ghost at a costume party. Why write malware when you can just weaponize the system itself?
Think of this like a hacker’s farmer’s market — fresh, organic, pre-installed tools straight from Microsoft’s garden.
Strictly for educational and defensive purposes only — misuse of these techniques outside of controlled environments is unethical and likely illegal.
Let’s be honest. If it’s not clever, sneaky or kinda horrifying, it’s not in this list:
rundll32with Scriptlets – Because nothing says “trusted” like executing evil through a Windows classicwmic+schtasks– Like leaving a Post-it note that says "run malware every Tuesday"mshta®svr32– Turn boring file formats into payload-delivery machinesAppDomainManager Injection– .NET sorcery that slips in like a backstage passWMI Event Subscription– Fileless, triggerable, and basically the ninja of persistenceToken Impersonation+SID History Abuse– Ever wanted to cosplay as SYSTEM?Debugger Key Hijack– Turn your apps into Trojan horses without changing a line of codeAlternate Data Streams– Hide your secrets where only weirdos go lookingSigned Proxy Execution– Let Windows vouch for your evil
Check the windows/ folder for AMSI bypasses, ghosting, COM tricks, and enough trust subversion to make your EDR cry.
These are the tricks that pentesters brag about and blue teams dread:
➡ windows/ — Packed with native tools
Each one includes usage, detection tips and real-world info so you can learn without face-planting.
Im cooking up some labs that string these techniques into full kill chains:
➡ labs/ — [Coming Soon] C2, privilege escalation, GhostStack takeovers… etc.
lab 5 will be a “big boss level” — full-stack compromise from firmware to AI poisoning.
Yeah, Windows is the messy one with probably plenty more, but Mac and Linux got some crazy skeletons too:
curl+bashcombos- Stealthy
systemdtimebombs osascriptMac voodoo
Coming soon — follow the repo so you don’t miss the Unix sidequests.
This repo is for:
- Defenders who want to think like attackers
- Red teamers who actually read docs
- Students who’d rather understand the system
If you're here with bad intentions or to be a menace — consider focusing your skills ethically, contributing constructively or simply stepping away.
- PRs welcome
- Be clever, not clumsy
- Keep it sharp, keep it useful
Stay stealthy. Stay smart.
Welcome to the land — just don’t trip on the ADS. 😈