mirror of
				https://github.com/GTFOBins/GTFOBins.github.io
				synced 2025-11-04 02:38:43 +01:00 
			
		
		
		
	
			
				
					
						
					
					8eaf595fe6daca6d87da2ff0e1f4c3411ebf949b
				
			
			
		
	Here the trick is to restore those file descriptors (0, 1, 2) that have been redirected (`dup2`) by the parent process. First we need to determine which one has been redirected, for example by looking at `ls -l /proc/$$/fd/`. Then we can use `0<&x`, `1>&x` or `2>&x` to restore 0, 1 or 2 respectively, where `x` is any file descriptor number that points to the TTY. It may happen that no file descriptor is unchanged, in that case we can use `tty` to perform the redirection: sh <$(tty) >$(tty) 2>$(tty)
GTFOBins 
GTFOBins is a curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.
Browse the project here.
					Languages
				
				
								
								
									HTML
								
								60%
							
						
							
								
								
									SCSS
								
								26.9%
							
						
							
								
								
									Python
								
								11.4%
							
						
							
								
								
									Makefile
								
								1.4%
							
						
							
								
								
									Ruby
								
								0.3%