Search for Unix binaries that can be exploited to bypass system security restrictions.
python linux reverse-shell binary post-exploitation bypass privilege-escalation exfiltration blueteam gtfo security-tools oscp redteam bind-shell gtfobins unix-binaries
-
Updated
Feb 4, 2026 - Python