All Projects → t0thkr1s → gtfo

t0thkr1s / gtfo

Licence: GPL-3.0 License
Search for Unix binaries that can be exploited to bypass system security restrictions.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to gtfo

Gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Stars: ✭ 6,030 (+6752.27%)
Mutual labels:  reverse-shell, post-exploitation, bypass, exfiltration, blueteam, redteam, bind-shell, gtfobins
Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+37296.59%)
Mutual labels:  bypass, privilege-escalation, redteam
Ultimateapplockerbypasslist
The goal of this repository is to document the most common techniques to bypass AppLocker.
Stars: ✭ 1,186 (+1247.73%)
Mutual labels:  bypass, blueteam, redteam
MsfMania
Python AV Evasion Tools
Stars: ✭ 388 (+340.91%)
Mutual labels:  reverse-shell, privilege-escalation, redteam
Wadcoms.github.io
WADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (+389.77%)
Mutual labels:  privilege-escalation, blueteam, redteam
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+1250%)
Mutual labels:  post-exploitation, privilege-escalation, redteam
Gtfonow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-22.73%)
Mutual labels:  post-exploitation, bypass, privilege-escalation
Reverse Shell Cheatsheet
🙃 Reverse Shell Cheat Sheet 🙃
Stars: ✭ 297 (+237.5%)
Mutual labels:  reverse-shell, oscp, redteam
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (+56.82%)
Mutual labels:  reverse-shell, oscp, redteam
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+88.64%)
Mutual labels:  post-exploitation, oscp, redteam
Torat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+371.59%)
Mutual labels:  reverse-shell, post-exploitation, privilege-escalation
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+119.32%)
Mutual labels:  reverse-shell, post-exploitation, oscp
php-reverse-shell
PHP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 274 (+211.36%)
Mutual labels:  reverse-shell, oscp
purple-team-exercise-framework
Purple Team Exercise Framework
Stars: ✭ 284 (+222.73%)
Mutual labels:  blueteam, redteam
1earn
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+4121.59%)
Mutual labels:  blueteam, redteam
adduser-dll
Simple DLL that add a user to the local Administrators group
Stars: ✭ 48 (-45.45%)
Mutual labels:  privilege-escalation, redteam
HellgateLoader CSharp
Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.
Stars: ✭ 73 (-17.05%)
Mutual labels:  bypass, redteam
Pentest-Service-Enumeration
Suggests programs to run against services found during the enumeration phase of a Pentest
Stars: ✭ 80 (-9.09%)
Mutual labels:  privilege-escalation, oscp
moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+518.18%)
Mutual labels:  privilege-escalation, redteam
go-gtfo
gtfo, now with the speed of golang
Stars: ✭ 59 (-32.95%)
Mutual labels:  gtfo, gtfobins

gtfo

made-with-python built-with-love

This is a standalone script written in Python 3 for GTFOBins. You can search for Unix binaries that can be exploited to bypass system security restrictions. These binaries can be abused to get the f**k break out of restricted shells, escalate privileges, transfer files, spawn bind and reverse shells, etc...

The functions are from https://github.com/GTFOBins/GTFOBins.github.io and all credit goes to its respective contributors. They are simplified (no need for environmental variables) and syntax highlighted.

Download

git clone https://github.com/t0thkr1s/gtfo

Install

The script has 2 dependencies:

You can install these by typing:

python3 setup.py install

Run

python3 gtfo.py [binary]

Screenshots

Screenshot 1 Screenshot 2
Screenshot1 Screenshot2

Disclaimer

This tool is only for testing and academic purposes and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this tool and software.

License

This project is licensed under the GPLv3 License - see the LICENSE file for details

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].