GTFOBins.github.io/index.md

26 lines
1.2 KiB
Markdown
Raw Normal View History

2018-05-21 21:14:41 +02:00
---
layout: page
title: GTFOBins
---
2018-05-30 13:16:44 +02:00
![logo](/assets/logo.png){:.logo}
2018-05-29 19:30:39 +02:00
2021-03-25 09:48:06 +01:00
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
2018-05-21 21:14:41 +02:00
The project collects legitimate [functions](/functions/) of Unix binaries that can be abused to ~~get the f**k~~ break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate the other post-exploitation tasks.
2018-05-22 09:06:20 +02:00
2020-12-05 19:31:46 +01:00
It is important to note that this is **not** a list of exploits, and the programs listed here are not vulnerable per se, rather, GTFOBins is a compendium about how to live off the land when you only have certain binaries available.
GTFOBins is a [collaborative][] project created by [Emilio Pinna][norbemi] and [Andrea Cardaci][cyrus_and] where everyone can [contribute][] with additional binaries and techniques.
2018-05-30 13:11:01 +02:00
If you are looking for Windows binaries you should visit [LOLBAS][].
2018-05-30 13:11:01 +02:00
[functions]: /functions/
2019-03-26 12:25:04 +01:00
[LOLBAS]: https://lolbas-project.github.io/
2018-05-30 13:11:01 +02:00
[collaborative]: https://github.com/GTFOBins/GTFOBins.github.io/graphs/contributors
[contribute]: /contribute/
2018-09-07 20:53:52 +02:00
[norbemi]: https://twitter.com/norbemi
2018-09-07 22:34:11 +02:00
[cyrus_and]: https://twitter.com/cyrus_and
2018-05-21 21:14:41 +02:00
{% include bin_table.html %}