.. /API
Star

LOLPROX data can be accessed programmatically via the raw YAML files in the GitHub repository.

Endpoints

All Binaries

Access the raw binary documentation files:

https://raw.githubusercontent.com/ZephrFish/LOLPROX/main/_lolprox/{binary}.md

Example:

https://raw.githubusercontent.com/ZephrFish/LOLPROX/main/_lolprox/qm.md

MITRE ATT&CK Navigator Layer

https://raw.githubusercontent.com/ZephrFish/LOLPROX/main/mitre_attack_navigator_layer.json

Function Categories

https://raw.githubusercontent.com/ZephrFish/LOLPROX/main/_data/functions.yml

Available Binaries

Binary Raw URL
pct pct.md
pve-firewall pve-firewall.md
pvecm pvecm.md
pveproxy pveproxy.md
pvesh pvesh.md
pvesm pvesm.md
pvesr pvesr.md
pveum pveum.md
pveversion pveversion.md
qm qm.md
socat socat.md
vzdump vzdump.md

Data Format

Each binary file uses YAML frontmatter with the following structure:

---
Name: binary-name
Description: Description of the binary
Author: Author name
Created: YYYY-MM-DD
Commands:
  - Command: command syntax
    Description: What the command does
    Usecase: How adversaries abuse it
    Category: discovery|execution|persistence|...
    Privileges: Administrator|User|Any
    MitreID: TXXXX.XXX
    OperatingSystem: Proxmox VE
    ProceduralExamples:
      - example 1
      - example 2
    Tags:
      - Tag 1
Full_Path:
  - Path: /path/to/binary
Detection:
  - Note: Detection guidance
Resources:
  - Link: https://documentation.url
Acknowledgement:
  - Person: Name
    Handle: '@twitter'
---