This article provides a curated list of AppLocker bypass techniques using trusted Microsoft-signed binaries (LOLBAS), with detailed examples and execution methods.