GTFOBins
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems. It serves as a valuable resource for pentesters, red teamers, and security researchers.
Key features:
- Comprehensive Binary List: Offers an extensive collection of Unix binaries.
- Bypass Techniques: Provides methods to exploit binaries for privilege escalation, code execution, and other security breaches.
- Clear Usage Examples: Includes practical examples for each binary, detailing how to leverage them in various scenarios.
- Easy Navigation: The website is well-organized, making it simple to find specific binaries and techniques.
Use cases:
- Privilege Escalation: Identify binaries that can be used to gain higher privileges on a system.
- Bypassing Restrictions: Find ways to circumvent restricted environments.
- Security Audits: Assist in identifying misconfigurations and vulnerabilities in Unix-like systems.
- Reverse Engineering: Understand how binaries can be abused for malicious purposes.