0xv1n

0xv1n / LOLGlobs

Public

A catalog of glob-based command obfuscation for Linux · macOS · Windows CMD/PowerShell

109
9
100% credibility
Found Feb 26, 2026 at 28 stars 4x -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

LOLGlobs is a searchable catalog of wildcard pattern techniques to execute system commands without full names on Linux, macOS, Windows CMD, and PowerShell, for educational security research.

How It Works

1
🔍 Discover LOLGlobs

You hear about this handy collection while reading up on clever computer security tricks online.

2
🌐 Visit the website

Head to the live site to check out the full list of techniques organized by computer type.

3
📱 Pick your platform

Choose Linux, Mac, Windows, or PowerShell to see examples that match what you use.

4
🔎 Search for commands

Type in a command name to quickly find shortcut patterns that hide how it's run.

5
📖 Explore the tricks

Read simple examples and notes on using stars and question marks to run commands sneakily.

6
Decide next
💡
Learn more

Browse extra categories like discovery or download to build your knowledge.

Share a new one

Submit a new trick you discovered to help others.

Master evasion spots

You now understand these hidden command tricks and can better protect systems from sneaky attacks.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 28 to 109 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is LOLGlobs?

LOLGlobs is a searchable catalog of glob-based command obfuscation techniques for Linux, macOS, Windows CMD/PowerShell, letting you evade signature-based detection in AV and EDR by using wildcards like `*`, `?`, and `[]` instead of full command names. Built as a Python-powered GitHub Pages site with YAML data entries, it offers a live demo site for browsing 43+ patterns across platforms, plus a JSON API endpoint for `https://0xv1n.github.io/LOLGlobs/api/entries.json` to pull entries programmatically. Think LOLBAS meets GTFOBins, but hyper-focused on shell glob evasion for process execution.

Why is it gaining traction?

It stands out with platform-specific examples that actually work—validated via automated tests—and MITRE ATT&CK mappings for quick threat intel ties. The search UI filters by platform, category (discovery, execution, exfil), or MITRE ID, with prefixes like `@linux /download` for fast queries. As a lightweight github catalog yaml like unity catalog github or iceberg catalog github, it's easy to fork and extend for custom red team kits.

Who should use this?

Red teamers crafting payloads to test EDR blind spots on Linux servers or Windows endpoints. Blue team defenders mapping glob evasion to improve behavioral rules in SIEMs. Security researchers auditing shell behaviors across macOS zsh and PowerShell.

Verdict

Solid niche reference with strong docs and validation, but at 27 stars and 1.0% credibility score, it's early-stage—grab it if you're in offensive security, but verify patterns yourself before prod tests. Worth starring for the API alone.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.