Skip to content

A Golang CLI to evaluate what potential binaries could be abused in a Unix system to escalate privileges, open a reverse shell, etc.

License

Notifications You must be signed in to change notification settings

juliendoutre/gogtfobins

Repository files navigation

Go GTFO Bins

https://gtfobins.github.io/ lists Unix binaries that can be abused if misconfigured.

This project is a Golang CLI meant to be used as a discovery tool to evaluate what potential binaries could be abused in a Unix system to escalate privileges, open a reverse shell, etc.

Getting started

brew tap juliendoutre/gogtfobins https://github.com/juliendoutre/gogtfobins
brew install gogtfobins

Check out the project releases on https://github.com/juliendoutre/gogtfobins/releases!

Usage

# List all available binaries allowing for opening a reverse shell on the current host.
gogtfobins list --function reverse-shell
# Print possible exploits for the docker binary as JSON.
gogtfobins describe docker --format json
# Get a reverse-shell using the docker binary.
gogtfobins exploit docker reverse-shell

Development

Lint the code

brew install golangci-lint
golangci-lint run

Release a new version

git tag -a v0.1.0 -m "First release"
git push origin v0.1.0

About

A Golang CLI to evaluate what potential binaries could be abused in a Unix system to escalate privileges, open a reverse shell, etc.

Resources

License

Stars

Watchers

Forks

Contributors 4

  •  
  •  
  •  
  •