This is a working list of more than 75 common Living off the Land binaries (and tools) used by adversaries in a cyber attack.
This list was created from real world attacks that have been publicly documented. Use this list for threat hunting or incident response triage.
Similiar resources to this one: https://lolbas-project.github.io/,
or Mitre's Software list for additional information, https://attack.mitre.org/software/