GTFOBins is a curated catalog of Unix / POSIX system binaries and how they can be misused to bypass restrictions, escalate privileges, exfiltrate data, spawn shells, or otherwise act as “living off the land” tools in a compromised environment. It collects documented techniques for how everyday binaries (e.g. awk, bash, tar, scp) can be abused under constrained conditions. Indexed list of Unix binaries and documented misuse techniques. Examples of command invocations to exploit misconfigurations. Scenarios for privilege escalation, file transfer, and process spawning. Community contributions to add or refine binary techniques.
Features
- Indexed list of Unix binaries and documented misuse techniques
- Examples of command invocations to exploit misconfigurations
- Scenarios for privilege escalation, file transfer, and process spawning
- Clear categorization by “what an attacker can do” (e.g. spawn shell, exfiltrate)
- Community contributions to add or refine binary techniques
- Static web interface / documentation for reference
Categories
SecurityLicense
GNU General Public License version 3.0 (GPLv3)Follow GTFOBins
Other Useful Business Software
MongoDB Atlas runs apps anywhere
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of GTFOBins!