GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
-
Updated
Jun 18, 2024 - HTML
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Helper script for checking SUID/SUDO permissions against GTFOBin data.
Abuse suid mis-configured binaries like a pro with -4buzer.
Learn Cyber Security, GTFObins and creating reverse shells
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
GTFOBins Search is a command-line tool that allows you to easily search GTFOBins for privilege escalation and bypass techniques using various Unix-like binaries
Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Project/LOLBAS), WADComs (https://wadcoms.github.io), and HijackLibs (https://hijacklibs.net/).
Speeding up identifying which binaries with a SUID flag may lead to root access
This script allows you to find and enumerate SUID binaries and check if one of them can be used to escalate or mantain elevated privileges in a iteractive way.
GTFOBins Offline Terminal with python
Webscrapper written in python3 to show gtfobins in a terminal.
Add a description, image, and links to the gtfobins topic page so that developers can more easily learn about it.
To associate your repository with the gtfobins topic, visit your repo's landing page and select "manage topics."