Skip to content

t0thkr1s/gtfobins-cli

Repository files navigation

🚀 GTFOBins CLI

Python License Stars

Overview

GTFOBins CLI is a command-line interface for GTFOBins, providing instant access to Unix binary exploitation techniques. This tool helps security professionals and system administrators identify and understand how legitimate Unix binaries can be misused to bypass security restrictions.

Key Features

  • 🔍 Quick Binary Lookup: Search exploitation techniques for any Unix binary
  • 🎨 Syntax Highlighting: Color-coded output for better readability
  • 📦 Offline Database: No internet connection required
  • 🚀 Instant Access: Fast, local searches with zero latency
  • 💻 Cross-Platform: Works on Linux, macOS, and Windows

Installation

From PyPI (Recommended)

pip install gtfobins-cli

From Source

git clone https://github.com/t0thkr1s/gtfo
cd gtfo
pip install -e .

Usage

Basic Usage

gtfo <binary>

Examples

# Search for sudo exploitation techniques
gtfo sudo

# Search for python exploitation techniques
gtfo python

# Check version
gtfo --version

Exploitation Categories

The tool provides information about various exploitation techniques:

  • Shell: Spawn an interactive shell
  • Command: Execute system commands
  • Reverse Shell: Establish a reverse shell connection
  • Non-interactive Reverse Shell: Create a non-interactive reverse shell
  • Bind Shell: Set up a bind shell
  • Non-interactive Bind Shell: Create a non-interactive bind shell
  • File Upload: Transfer files to the target system
  • File Download: Extract files from the target system
  • File Write: Write data to files
  • File Read: Read file contents
  • Library Load: Load shared libraries
  • SUID: Exploit SUID permissions
  • Sudo: Exploit sudo permissions
  • Capabilities: Exploit Linux capabilities
  • Limited SUID: Work with limited SUID permissions

Screenshots

GTFOBins CLI Screenshot 1      GTFOBins CLI Screenshot 2

Development

Setting up Development Environment

# Clone the repository
git clone https://github.com/t0thkr1s/gtfo
cd gtfo

# Create virtual environment
python -m venv venv
source venv/bin/activate  # On Windows: venv\Scripts\activate

# Install in development mode
pip install -e .

Running Tests

# Install test dependencies
pip install pytest pytest-cov

# Run tests
pytest

Contributing

Contributions are welcome! Please feel free to submit a Pull Request. For major changes, please open an issue first to discuss what you would like to change.

  1. Fork the repository
  2. Create your feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add some amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a Pull Request

Credits

  • Binary exploitation data from GTFOBins
  • Original GTFOBins project contributors
  • Created and maintained by t0thkr1s

Security Notice

⚠️ Important: This tool is designed for authorized security testing and educational purposes only. Users must:

  • Only use this tool on systems they own or have explicit permission to test
  • Comply with all applicable laws and regulations
  • Understand that misuse of this tool may result in criminal charges

The developers assume no liability and are not responsible for any misuse or damage caused by this tool.

License

This project is licensed under the GNU General Public License v3.0 - see the LICENSE file for details.

Support

If you encounter any issues or have questions:

  • Open an issue
  • Check existing issues for solutions
  • Consult the GTFOBins website for additional information