LOLPROX data can be accessed programmatically via the raw YAML files in the GitHub repository.
Access the raw binary documentation files:
https://raw.githubusercontent.com/ZephrFish/LOLPROX/main/_lolprox/{binary}.md
Example:
https://raw.githubusercontent.com/ZephrFish/LOLPROX/main/_lolprox/qm.md
https://raw.githubusercontent.com/ZephrFish/LOLPROX/main/mitre_attack_navigator_layer.json
https://raw.githubusercontent.com/ZephrFish/LOLPROX/main/_data/functions.yml
| Binary | Raw URL |
|---|---|
| pct | pct.md |
| pve-firewall | pve-firewall.md |
| pvecm | pvecm.md |
| pveproxy | pveproxy.md |
| pvesh | pvesh.md |
| pvesm | pvesm.md |
| pvesr | pvesr.md |
| pveum | pveum.md |
| pveversion | pveversion.md |
| qm | qm.md |
| socat | socat.md |
| vzdump | vzdump.md |
Each binary file uses YAML frontmatter with the following structure:
---
Name: binary-name
Description: Description of the binary
Author: Author name
Created: YYYY-MM-DD
Commands:
- Command: command syntax
Description: What the command does
Usecase: How adversaries abuse it
Category: discovery|execution|persistence|...
Privileges: Administrator|User|Any
MitreID: TXXXX.XXX
OperatingSystem: Proxmox VE
ProceduralExamples:
- example 1
- example 2
Tags:
- Tag 1
Full_Path:
- Path: /path/to/binary
Detection:
- Note: Detection guidance
Resources:
- Link: https://documentation.url
Acknowledgement:
- Person: Name
Handle: '@twitter'
---