A binary may support one or more of the following functions:
The LOLBAS can achieve arbitrary code execution.
The LOLBAS can download files.
The LOLBAS can upload files.
The LOLBAS can encode files.
The LOLBAS can decode files.
The LOLBAS can write or read alternate data streams.
The LOLBAS can copy file.
The LOLBAS can view credentials file.
The LOLBAS can compile code.
The LOLBAS can bypass application allowlisting solutions.
The LOLBAS can bypass User Access Control in Windows.
The LOLBAS can be used to gather interesting information.
The LOLBAS can be used to dump the memory contents of a process.
The LOLBAS can be used to tamper with files, processes, etc.
The LOLBAS can be used to conceal malicious activity.