Welcome to LOLDrivers (Living Off The Land Drivers), an exciting open-source project that brings together vulnerable, malicious, and known malicious Windows drivers in one comprehensive repository. Our mission is to empower organizations of all sizes with the knowledge and tools to understand and address driver-related security risks, making their systems safer and more reliable.
- An extensive and well-organized collection of vulnerable and malicious Windows drivers
- Continuously updated with the latest information on driver vulnerabilities and threats
- Easy-to-navigate categories and indices for quick access to relevant information
- Seamless integration with Sigma for proactive defense using hash prevention
- Enhance visibility into vulnerable drivers within your infrastructure, fostering a stronger security posture
- Stay ahead of the curve by being informed about the latest driver-related threats and vulnerabilities
- Swiftly identify and address risks associated with driver vulnerabilities, minimizing potential damages
- Leverage compatibility with Sigma to proactively block known malicious drivers by hash
To begin your journey with LOLDrivers, simply check out the LOLDrivers.io site or clone the repository and explore the wealth of information available in the categorized directories. We've designed the site to help you easily find the insights you need to protect your systems from vulnerable drivers.
To assist in speeding up the creating of a yaml file, check out loldrivers.streamlit.app
Please use the GitHub issue tracker to submit bugs or request features.
Stay engaged with the LOLDrivers community by regularly checking for updates and contributing to the project. Your involvement will help ensure the project remains up-to-date and even more valuable to others.
Join us in our quest to create a safer and more secure digital environment for organizations everywhere. With LOLDrivers by your side, you'll be well-equipped to tackle driver-related security risks and confidently navigate the ever-evolving cyber landscape.
If you'd like to contribute, please follow these steps:
- Fork the repository
- Create a new branch for your changes
- Make your changes and commit them to your branch
- Push your changes to your fork
- Open a Pull Request (PR) against the upstream repository
For more detailed instructions, please refer to the CONTRIBUTING.md file. To create a new YAML file for a driver, use the provided YML-Template.
LOLDrivers provides comprehensive Sigma, Yara, ClamAV and Sysmon detection rules to help you effectively detect potential threats. To explore these rules in detail, navigate to the sigma, yara, av and sysmon directories under the detection folder. Also there is WDAC policy thanks to Florian Stosse and HotCakeX.
Happy hunting! 🕵️♂️
The community has also created a PowerShell LOLDriver scanner courtesy of @Oddvarmoe, @M_haggis, and IISResetMe, that can help you identify potentially malicious drivers. The script, available here, allows you to scan a specified Windows folder for any suspicious files. We recommend running the script on directories such as:
C:\WINDOWS\inf
C:\WINDOWS\System32\drivers
C:\WINDOWS\System32\DriverStore\FileRepository
- Clone the repository:
git clone https://github.com/magicsword-io/LOLDrivers.git
- Change to the project directory:
cd LOLDrivers
- Install dependencies:
poetry install
- Activate the virtual environment:
poetry shell
- Build the site using the files under the /yaml folder:
python bin/site.py
- Run the website locally:
cd loldrivers.io && hugo serve