Announcing LOLRMM: A Unified Approach to RMM Software Tracking
LOLRMM introduces a centralized, community-driven approach for tracking RMM (Remote Monitoring & Management) software across environments. This tool helps security teams inventory, monitor, and analyze installed RMM tools, improving visibility into remote-management exposures.

Today, we are thrilled to announce the launch of the Living Off The Land Remote Monitoring and Management (LOLRMM) software project. This groundbreaking initiative aims to revolutionize how we track and manage Remote Monitoring and Management (RMM) utilities in cybersecurity.
Check it out now: https://lolrmm.io
Looking for the API? We got you:
JSON, CSV
What is LOLRMM?
LOLRMM is a centralized platform designed to help defenders identify and remediate RMM software within their environments proactively. By consolidating information about various RMM tools, we’re empowering organizations to enhance their security posture and mitigate potential risks associated with these powerful utilities.

https://www.lolrmm.io/tools/anydesk
Why LOLRMM Matters
Remote Monitoring and Management software plays a crucial role in IT operations, but it can also be exploited by threat actors for malicious purposes. LOLRMM addresses this challenge by:
- Providing a comprehensive database of RMM software
- Offering insights and artifacts of various RMM software
- Facilitating proactive identification and remediation strategies
- Fostering collaboration within the cybersecurity community
Standing on the Shoulders of Giants
LOLRMM wouldn’t be possible without the invaluable contributions made by numerous projects and individuals in the cybersecurity industry. We’d like to acknowledge the following projects that have paved the way for LOLRMM:
- Steven Dick — Splunk Lookup
- phillmoore -> Ruler Project
- Mthcht — RMM
- CyberSpoon — RMM-Catalogue
- Justin Ibarra — Gist
- Red Canary -Surveyor
We want to also thank our founding contributors:
Community-Driven Development
The strength of LOLRMM lies in its community. We’re not just launching a project; we’re initiating a movement. Here’s how you can contribute:
- Share Your Knowledge: Have experience with a particular RMM tool? Contribute your insights to our database.
- Report Findings: Encountered an RMM tool in the wild? Help us keep our information up-to-date.
- Develop Detection Rules: Create and share Sigma rules for various security platforms.
- Improve Documentation: Help us make LOLRMM more accessible to defenders of all skill levels.
We’re here to facilitate and engage the community, ensuring LOLRMM remains the most detailed and centralized resource for all things RMM.
What’s Next?
As we embark on this journey, we have exciting plans for the future of LOLRMM:
- Expanding our database of RMM software
- Developing integrations with popular security tools
- Creating comprehensive guides for RMM identification and remediation
Join the LOLRMM Community
We invite you to be part of this exciting initiative. Whether you’re a seasoned security professional or just starting your journey in cybersecurity, there’s a place for you in the LOLRMM community.
Visit our GitHub repository https://github.com/magicsword-io/LOLRMM to get started.
Together, we can build a more secure digital landscape by mastering the art of RMM software management.
Let’s make LOLRMM the go-to resource for all things RMM in cybersecurity!

Written by
Michael Haag
Threat Researcher
In the intricate chessboard of cybersecurity, my role oscillates between a master tactician and a relentless hunter. As an expert in detection engineering and threat hunting, I don't just respond to the digital threats, I anticipate them, ensuring that the digital realm remains sovereign.


