Search for Unix binaries that can be exploited to bypass system security restrictions.
python linux reverse-shell binary post-exploitation bypass privilege-escalation exfiltration blueteam gtfo security-tools oscp redteam bind-shell gtfobins unix-binaries
-
Updated
May 16, 2021 - Python