Search for Unix binaries that can be exploited to bypass system security restrictions.
python linux reverse-shell binary post-exploitation bypass privilege-escalation exfiltration blueteam gtfo security-tools oscp redteam bind-shell gtfobins unix-binaries
-
Updated
Aug 7, 2025 - Python