Avoid the "exploit" verb to reduce confusion

This commit is contained in:
Andrea Cardaci
2020-12-05 17:49:56 +01:00
parent 12b8ceee39
commit 31af1e879f
3 changed files with 9 additions and 9 deletions

View File

@@ -5,14 +5,14 @@ title: GTFOBins
![logo](/assets/logo.png){:.logo}
GTFOBins is a curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.
GTFOBins is a curated list of Unix binaries that can used to bypass local security restrictions in misconfigured systems.
The project collects legitimate functions of Unix binaries that can be abused to <strike>get the f**k</strike> break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate the other post-exploitation tasks. See the full list of [functions](/functions/).
This was inspired by the [LOLBAS][] project for Windows.
The project collects legitimate [functions](/functions/) of Unix binaries that can be abused to ~~get the f**k~~ break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate the other post-exploitation tasks.
GTFOBins is a [collaborative][] project created by [Emilio Pinna][norbemi] and [Andrea Cardaci][cyrus_and] where everyone can [contribute][] with additional binaries and techniques.
If you are looking for Windows binaries you should visit [LOLBAS][].
[functions]: /functions/
[LOLBAS]: https://lolbas-project.github.io/
[collaborative]: https://github.com/GTFOBins/GTFOBins.github.io/graphs/contributors