GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
-
Updated
Oct 28, 2024 - HTML
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Penelope Shell Handler
PHP shells that work on Linux OS, macOS, and Windows OS.
PowerShell scripts for communicating with a remote host.
Search for Unix binaries that can be exploited to bypass system security restrictions.
GodOfWar - Malicious Java WAR builder with built-in payloads
arbitrary TCP and UDP connections and listens (Netcat for Python).
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
JAR, Java, and JSP shells that work on Linux OS, macOS, and Windows OS.
More bind and reverse shells! This time written in Rust.
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
Automatic reverse/bind shell generator cheat sheet.
Simple reverse and bind shells written in Go.
Remote command shell application written in C#, targeting the .NET 8 runtime.
-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.
List of payloads: reverse shell, bind shell, webshell.
Add a description, image, and links to the bind-shell topic page so that developers can more easily learn about it.
To associate your repository with the bind-shell topic, visit your repo's landing page and select "manage topics."