From f48c11cdce101b3e77c8a06f2b0c5f3513af720b Mon Sep 17 00:00:00 2001 From: fabacab Date: Wed, 20 Oct 2021 15:33:28 -0400 Subject: [PATCH] Add GTFOBins to privesc section. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index baed622..1e9a096 100644 --- a/README.md +++ b/README.md @@ -651,6 +651,7 @@ See also *[Web-accessible source code ripping tools](#web-accessible-source-code ## Privilege Escalation Tools * [Active Directory and Privilege Escalation (ADAPE)](https://github.com/hausec/ADAPE-Script) - Umbrella script that automates numerous useful PowerShell modules to discover security misconfigurations and attempt privilege escalation against Active Directory. +* [GTFOBins](https://gtfobins.github.io/) - Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems. * [LinEnum](https://github.com/rebootuser/LinEnum) - Scripted local Linux enumeration and privilege escalation checker useful for auditing a host and during CTF gaming. * [Postenum](https://github.com/mbahadou/postenum) - Shell script used for enumerating possible privilege escalation opportunities on a local GNU/Linux system. * [unix-privesc-check](https://github.com/pentestmonkey/unix-privesc-check) - Shell script to check for simple privilege escalation vectors on UNIX systems.