Skip to content
Tech News
← Back to articles

GTFOBins

read original get GTFOBins Security Toolkit → more articles
Why This Matters

GTFOBins is a vital resource for security professionals and system administrators, highlighting how legitimate Unix-like executables can be exploited to bypass security measures and perform post-exploitation activities. Its insights help improve system defenses by understanding potential attack vectors. The project emphasizes the importance of proper system configuration and monitoring to prevent misuse of trusted binaries.

Key Takeaways

GTFO Bins Sponsor Fork Star Sponsor Fork Star

GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.

The project collects legitimate functions of Unix-like executables that can be abused to get the f**k break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate other post-exploitation tasks.

GTFOBins is a joint effort by Emilio Pinna and Andrea Cardaci, and many other contributors. Everyone can get involved by providing additional entries and techniques!

If you are looking for Windows binaries you should visit LOLBAS.

Please note that this is not a list of exploits, and the programs listed here are not vulnerable per se, rather, GTFOBins is a compendium about how to live off the land when you only have certain executables available.

GitHub | Get involved | Contributors | JSON API | MITRE ATT&CK® Navigator