GTFOBins CLI is a command-line interface for GTFOBins, providing instant access to Unix binary exploitation techniques. This tool helps security professionals and system administrators identify and understand how legitimate Unix binaries can be misused to bypass security restrictions.
- π Quick Binary Lookup: Search exploitation techniques for any Unix binary
- π Fuzzy Search: Find binaries with partial name matching
- π·οΈ Filter by Type: Filter binaries by exploitation type (shell, suid, sudo, etc.)
- π₯οΈ Interactive Mode: fzf-style autocomplete for quick navigation
- π¨ Syntax Highlighting: Color-coded output for better readability
- π¦ Offline Database: No internet connection required
- π Instant Access: Fast, local searches with zero latency
- π» Cross-Platform: Works on Linux, macOS, and Windows
pipx install git+https://github.com/kasem545/gtfobins-cli
git clone https://github.com/kasem545/gtfobins-cli cd gtfobins-cli pip install -e .
gtfo <binary>
# Search for sudo exploitation techniques gtfo sudo # Search for python exploitation techniques gtfo python # Fuzzy search binaries by name gtfo -s pyth # Filter binaries by exploitation type gtfo -f shell gtfo -f suid gtfo -f sudo # Show only specific technique for a binary gtfo python -f sudo # Interactive mode with autocomplete gtfo -i # List all available binaries gtfo -l # Check version gtfo --version
| Option | Description |
|---|---|
binary |
Unix binary to search for exploitation techniques |
-s, --search TERM |
Fuzzy search binaries by name |
-f, --filter TYPE |
Filter binaries by exploitation type |
-i, --interactive |
Interactive mode with autocomplete |
-l, --list |
List all available binaries |
-v, --version |
Show version |
-h, --help |
Show help message |
The tool provides information about various exploitation techniques:
- Shell: Spawn an interactive shell
- Command: Execute system commands
- Reverse Shell: Establish a reverse shell connection
- Non-interactive Reverse Shell: Create a non-interactive reverse shell
- Bind Shell: Set up a bind shell
- Non-interactive Bind Shell: Create a non-interactive bind shell
- File Upload: Transfer files to the target system
- File Download: Extract files from the target system
- File Write: Write data to files
- File Read: Read file contents
- Library Load: Load shared libraries
- SUID: Exploit SUID permissions
- Sudo: Exploit sudo permissions
- Capabilities: Exploit Linux capabilities
- Limited SUID: Work with limited SUID permissions
# Clone the repository git clone https://github.com/kasem545/gtfobins-cli cd gtfo # Create virtual environment python -m venv venv source venv/bin/activate # On Windows: venv\Scripts\activate # Install in development mode pip install -e .
# Install test dependencies pip install pytest pytest-cov # Run tests pytest
Contributions are welcome! Please feel free to submit a Pull Request. For major changes, please open an issue first to discuss what you would like to change.
- Fork the repository
- Create your feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add some amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
- Binary exploitation data from GTFOBins
- Original GTFOBins project contributors
- Created by t0thkr1s
- maintained by kasem545
- Only use this tool on systems they own or have explicit permission to test
- Comply with all applicable laws and regulations
- Understand that misuse of this tool may result in criminal charges
The developers assume no liability and are not responsible for any misuse or damage caused by this tool.
This project is licensed under the GNU General Public License v3.0 - see the LICENSE file for details.
If you encounter any issues or have questions:
- Open an issue
- Check existing issues for solutions
- Consult the GTFOBins website for additional information