Living Off The Land AI

Comprehensive database documenting AI agents that can be weaponized, abused, or exploited in enterprise and personal computing environments.

11 AI Agents
3 Categories
19 MITRE Techniques

About LOLAI

LOLAI documents AI agents that can be abused for malicious purposes in enterprise and personal environments. Similar to GTFOBins and LOLBAS projects, we provide detailed information about attack vectors, capabilities, and detection methods.

Attack Vectors

How these agents can be weaponized

Capabilities

System access and permissions

Detection

Artifacts, logs, and IOCs

MITRE ATT&CK

Industry framework alignment