Binary Exploitation

Binary exploitation is one method of finding and leveraging vulnerabilities in computer programs to modify or interrupt their intended behaviors.

GTOBins

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.

LOLBAS

LOLBAS (Living Off The Land Binaries And Scripts) serves a similar purpose thab GTOBins but in Windows environments.

Last updated

Was this helpful?