Skip to content

LotL-Watcher is a lightweight security monitoring tool designed to detect and mitigate "Living-off-the-Land" attacks. Instead of relying on traditional file signatures, this tool monitors the behavior of trusted Windows binaries (like certutil, powershell, wmic, mshta).

License

Notifications You must be signed in to change notification settings

ogtamimi/Living-off-the-Land-Protection-Platform

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

21 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

USB Rubber Ducky Immunizer Banner

πŸ›‘οΈ OGT WatchTower v2

Advanced Behavioral Protection Platform

"Watching What Others Miss" - Kernel-level visibility to detect and prevent Living-off-the-Land (LOLBin) attacks.

License: MIT Platform .NET Status Python Version

πŸš€ What's New in v2?

Version 2 represents a complete rewrite in C# / .NET 10 for maximum performance and native system integration:

  • High-Performance Engine: Native .NET implementation drastically reduces overhead compared to previous versions.
  • Modern WPF Interface: A completely new, polished UI with dark mode, fluent design, and real-time animations.
  • Enhanced Detection: Improved Sigma Rule engine with support for complex condition matching.
  • System Health Reports: Generate comprehensive PDF-style reports on system security status and threat history.
  • Smart Response: Tiered response capabilities (Auto-Kill for High/Critical threats, Auto-Suspend for others).
  • Zero-Config Deployment: Self-contained executable with no external dependencies required.

πŸ“‘ Table of Contents

✨ Features

πŸ” Advanced Detection

  • Real-time Event Stats: Monitors Process Creation with kernel-level precision using WMI/ETW.
  • Sigma Rule Support: Compatible with industry-standard Sigma rules (.yml) for threat detection.
  • YARA Scanning: Integrated YARA engine to verify binary identity and detect masquerading malware.

πŸ›‘οΈ Automated Response

  • Tiered Protection:
    • Auto-Kill: Instantly terminates High and Critical severity threats (e.g., encoded PowerShell).
    • Auto-Suspend: Suspends suspicious processes to allow for forensic investigation.
  • Forensic Snapshots: Captures process metadata and state before termination.

🌐 Threat Intelligence

  • Cloud Sentry: Integration with VirusTotal and AbuseIPDB for real-time reputation checking.
  • System Health Reporting: One-click generation of security status reports.

πŸ’Ώ Installation

Prerequisites

  • Windows 10/11 (64-bit)
  • Administrator Privileges (Required for process monitoring and termination)

Step 1: Run WatchTower

  1. Navigate to the release/ folder.
  2. Double-click OGT.WatchTower.App.exe (Run as Administrator).

Step 2: Verify Protection

Run the included simulation script to test defenses:

./simulate_attacks/simulate_attack.bat

πŸš€ Usage

The Command Center

The new WPF GUI provides a real-time view of your system's security posture:

  • Live Feed: Watch every process creation event with color-coded threat levels.
  • Alerts: High-priority threats appear in the alerts section with immediate action buttons.
  • Dashboard: Track total events, threats, and system health status.

System Reports

Click the Report button (left of Active button) to generate a detailed system health report showing:

  • Current Security Status (SECURE / AT RISK)
  • Latest Threat Details (Name, Severity, Location, Impact)
  • Action Taken (e.g., PROCESS TERMINATED)

πŸ“Έ Screenshots

Main Dashboard

Dashboard Real-time monitoring dashboard with threat statistics and status indicators

Live Monitoring Panel

Monitoring Active process monitoring with threat level indicators and modern data grid

Settings & Configuration

Settings Granular control over protection sensitivity and automated responses

βš™οΈ Configuration

Edit config/settings.json in the release folder to enable features and add API keys:

{
    "Response": {
        "AutoKill": true,
        "AutoSuspend": true
    },
    "ApiKeys": {
        "VirusTotal": "YOUR_KEY_HERE",
        "AbuseIPDB": "YOUR_KEY_HERE"
    }
}

Add your custom detection rules to config/rules/*.yml.

πŸ—οΈ Architecture

graph TD
    A[WMI / ETW] -->|Events| B(Core Engine .NET)
    B --> C{Detection Pipeline}
    C -->|Check| D[Sigma Rules]
    C -->|Scan| E[YARA Engine]
    C -->|Query| F[Cloud Intelligence]
    C -->|Alert| G[WPF UI]
    C -->|High Threat| H[Response Module]
    H --> I[System Report]
    H --> J[Process Termination]
Loading

οΏ½ File Structure

/
β”œβ”€β”€ assets/                 # Icons and Screenshots
β”œβ”€β”€ release/                # Production-ready executable and config
β”‚   β”œβ”€β”€ config/             # Detection rules and settings
β”‚   └── OGT.WatchTower.App.exe
β”œβ”€β”€ simulate_attacks/       # Attack simulation scripts
β”œβ”€β”€ src/                    # Source code
β”œβ”€β”€ README.md               # Documentation
└── SECURITY.md             # Security policy

πŸ“„ License

MIT License - Copyright Β© 2026 OGT (Omar Al Tamimi).

About

LotL-Watcher is a lightweight security monitoring tool designed to detect and mitigate "Living-off-the-Land" attacks. Instead of relying on traditional file signatures, this tool monitors the behavior of trusted Windows binaries (like certutil, powershell, wmic, mshta).

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks