Binary Exploitation
Binary exploitation is one method of finding and leveraging vulnerabilities in computer programs to modify or interrupt their intended behaviors.
GTOBins
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
LOLBAS
LOLBAS (Living Off The Land Binaries And Scripts) serves a similar purpose thab GTOBins but in Windows environments.
Last updated
Was this helpful?