Announcing LOLRMM: A Unified Approach to RMM Software Tracking

LOLRMM introduces a centralized, community-driven approach for tracking RMM (Remote Monitoring & Management) software across environments. This tool helps security teams inventory, monitor, and analyze installed RMM tools, improving visibility into remote-management exposures.

August 25, 20253 min read
Homepage of the LOLRMM project displaying its RMM tool tracking description, resource links, API options, and MagicSword integration for blocking remote management tools

Today, we are thrilled to announce the launch of the Living Off The Land Remote Monitoring and Management (LOLRMM) software project. This groundbreaking initiative aims to revolutionize how we track and manage Remote Monitoring and Management (RMM) utilities in cybersecurity.

Check it out now: https://lolrmm.io

Looking for the API? We got you:
JSON, CSV

What is LOLRMM?

LOLRMM is a centralized platform designed to help defenders identify and remediate RMM software within their environments proactively. By consolidating information about various RMM tools, we’re empowering organizations to enhance their security posture and mitigate potential risks associated with these powerful utilities.

https://thedfirreport.com/2024/06/10/icedid-brings-screenconnect-and-csharp-streamer-to-alphv-ransomware-deployment/

Blog image

https://www.lolrmm.io/tools/anydesk
Why LOLRMM Matters

Remote Monitoring and Management software plays a crucial role in IT operations, but it can also be exploited by threat actors for malicious purposes. LOLRMM addresses this challenge by:

  1. Providing a comprehensive database of RMM software
  2. Offering insights and artifacts of various RMM software
  3. Facilitating proactive identification and remediation strategies
  4. Fostering collaboration within the cybersecurity community

Standing on the Shoulders of Giants

LOLRMM wouldn’t be possible without the invaluable contributions made by numerous projects and individuals in the cybersecurity industry. We’d like to acknowledge the following projects that have paved the way for LOLRMM:

We want to also thank our founding contributors:

Community-Driven Development

The strength of LOLRMM lies in its community. We’re not just launching a project; we’re initiating a movement. Here’s how you can contribute:

  • Share Your Knowledge: Have experience with a particular RMM tool? Contribute your insights to our database.
  • Report Findings: Encountered an RMM tool in the wild? Help us keep our information up-to-date.
  • Develop Detection Rules: Create and share Sigma rules for various security platforms.
  • Improve Documentation: Help us make LOLRMM more accessible to defenders of all skill levels.

We’re here to facilitate and engage the community, ensuring LOLRMM remains the most detailed and centralized resource for all things RMM.

What’s Next?

As we embark on this journey, we have exciting plans for the future of LOLRMM:

  1. Expanding our database of RMM software
  2. Developing integrations with popular security tools
  3. Creating comprehensive guides for RMM identification and remediation

Join the LOLRMM Community

We invite you to be part of this exciting initiative. Whether you’re a seasoned security professional or just starting your journey in cybersecurity, there’s a place for you in the LOLRMM community.

Visit our GitHub repository https://github.com/magicsword-io/LOLRMM to get started.

Together, we can build a more secure digital landscape by mastering the art of RMM software management.

Let’s make LOLRMM the go-to resource for all things RMM in cybersecurity!

Michael Haag

Written by

Michael Haag

Threat Researcher

In the intricate chessboard of cybersecurity, my role oscillates between a master tactician and a relentless hunter. As an expert in detection engineering and threat hunting, I don't just respond to the digital threats, I anticipate them, ensuring that the digital realm remains sovereign.

© 2025 MagicSword. All rights reserved.