-
Linux is saved to a file after looking at suid and guid on the computer.
In this way, the following captured data can be compared with two files.
`curl https://gtfobins.github.io |grep '
secfb updated
5 years ago
-
Wondering if there is any value in adding some functionality to find setuid files? Basically just a function that calls `find / -perm 4000 2>/dev/null` (for setuid) and `getcap -r / 2>/dev/null` (for …
-
cpulimit of Unix binaries that can be exploited to bypass system security restrictions
* https://gtfobins.github.io/gtfobins/cpulimit/
* https://gtfobins.github.io/
denji updated
5 years ago
-
Your tool/software has been inventoried on [*Rawsec's CyberSecurity Inventory*](https://inventory.rawsec.ml/).
https://inventory.rawsec.ml/resources.html#GTFOBins
### What is Rawsec's CyberSecur…
noraj updated
5 years ago
-
## Steps to reproduce
When using `send_request_cgi` to deliver `payload.encoded` the call hangs (since the payload is executed and does not return) so `exploit()` needs to wait the timeout (20s def…
-
First of all thanks for this interesting project.
I've already made a post on (sorry for the cross-post)
https://security.stackexchange.com/questions/197900/command-line-tools-exploitable-on-linux
…