Legitimate Utilities and LotL
Many legitimate Windows and Linux utilities can be used in post-exploitation. Use of legitimate tools to perform post-exploitation activity is referred to as Living-off-the-land or fileless malware. Fileless malware is reference to the idea that there is no need to install any additional software or binaries. Examples of living-off-the-land techniques include:
PowerShell
PowerSploit and Empire
BloodHound
WMI
SysInternals and PSExec
WinRM
Last updated