frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

GTFOBins

https://gtfobins.org/
76•StefanBatory•1h ago

Comments

stackghost•1h ago
These come up in CTFs all the time. One trick I don't see here is you can use `dd` to write into the `/proc` hierarchy to achieve all sorts of fuckery including patching shellcode into a running process.
saagarjha•51m ago
I don't think I've used any of these in a CTF tbh
stackghost•25m ago
I've definitely used one or two in the last 6 months
saagarjha•13m ago
For what kind of challenge? Most of these are not even available in CTF environments
dominicq•38m ago
Huh? How does that work exactly? I've heard of /proc fuckery before but didn't know you could disable aslr with it.
stackghost•27m ago
Hey you know what, I've used dd to write into process memory but haven't actually used it to disable KASLR, so it's possible I am misremembering. My bad.
dominicq•24m ago
:(

Sounds super 1337 and I hope it's actually possible somehow.

jstrebel•55m ago
But you would already have to have shell access to the system to execute those commands, right?
ifh-hn•52m ago
But that sort of access is only a social engineer away. People still click on stuff in emails, or run commands because a computer says so.
DaSHacka•32m ago
Not just shell access, but the server would need to be configured to also enable your user to run any of these binaries as root (such as an administrator putting them in the sudoers file).

So they're a pretty niche attack vector, and oftentimes crop up as a result of lazy/incompetent sysadmins.

npodbielski•47m ago
Ok. It have hundrends o example for all sort of tools, 7z, dig, git. Those are very popular.

Question from security newbie. Why it is not used to hack all sort of servers all the time then?

pech0rin•41m ago
Because you have to have shell access to the server to use any of these.
dominicq•39m ago
You need initial access. This is just a list of tools you can use if you can't spawn a standard interactive shell, for whatever reason.

It doesn't make it easier to "hack" servers, it's just a list of things that you could use once you're already inside.

DaSHacka•38m ago
It's only relevant as a privilege escalation vector when you're able to execute those programs as root, but don't otherwise have root access on the server.

It's a pretty niche circumstance. Unless an admin allows users on a server to execute some of these random types of binaries as root, it's not going to be a concern. And, if it wasn't already obvious, distros are almost never configured this way OOTB

olmo23•25m ago
In certain circumstances, they might be :-)

But you can't "hack a server" using just these techniques: they would be a (small) part of a chain of exploits.

laserbeam•42m ago
I am confused. Is this saying that if you don't have access to `cat`, instead of `cat /path/to/input-file` you can use `base64 /path/to/input-file | base64 --decode`?

Or is it saying that `base64 /path/to/input-file | base64 --decode` can bypass read file permission flags?

dominicq•35m ago
The first thing. Invoked processes inherit the permissions of the user who invoked them (unless they have the setuid bit). It's just in case you land access to a computer which has all the standard Unix tools disabled to stop attackers from lateral movement.
DaSHacka•34m ago
If there's a file your user does not have read access to, but you have the ability to run the `base64` binary as root, you can run `base64` as root, (thus encoding the file contents as base64), then pipe the output to another base64 process to decode the file contents.

So yes, the end result is just `cat` with extra steps.

tgv•40m ago
I'm not sure I get it. base64 is on the list. That can't do anything but read a file to which the user already has access, I think. Am I mistaken or does "a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems" not mean what I think it does?
david_shaw•36m ago
I think the idea is that if you're given an improperly configured restricted shell/command access, you can use any of the listed tools to gain access to some subset of what that user would normally have access to in an unrestricted environment.

A very simple version of this would be if you set a user's default shell to "rbash" but the user can just run "bash" to get a real shell.

arcfour•12m ago
Maybe sudoers is configured to allow you to run base64 as root. Why would someone do this? No idea. But if you are in such a situation, now you know how to bypass the intended permissions and read any file on the system.

Or maybe you give Claude Code permission to run `base64` without review without realizing this lets it read any file, including maybe your secrets in .env or something.

RagingCactus•36m ago
Seeing the confusion in the comments I want to provide some examples of situations where this might come up in a security or CTF context:

* You have a restricted shell or other way to execute a restricted set of commands or binaries, often with arbitrary parameters. You can use GTFOBins in interesting ways to read files, write files, or even execute commands and ultimately break out of your restricted context into a shell.

* Someone allowed sudo access or set the SUID bit on a GTFOBin. Using these tricks, you may be able to read or write sensitive files or execute privileged commands in a way the person configuring sudo did not know about.

eterm•15m ago
This is pretty relevant for things like claude-code, which has a fairly rudimentary way of dealing with permissions with block-lists and allow-lists.

I once accidentally gave my claude "powershell" permissions in one session, and after that any time it found it was blocked from using a tool, e.g. git, it would write a powershell script that did the same thing and execute the script to work around the blocked permission.

Obviously no sane system would have "powershell" in a generic allow-list, but you could imagine some discrepancy in allowed levels between tools which can be worked around with the techniques on this page.

troupo•6m ago
Power Shell or Python scripts to work around restrictions are the go to for LLMs.

And it doesn't stip there.

Yesterday I was trying to figure out some icons issue in KDE plasma (I know nothing about KDE). Both Claude and Cidex would run complex bus and debug queries and write and execute QML scripts with more and more tools thrown into the mix.

There's no way to properly block them with just allow- and block lists

DaSHacka•22m ago
See also:

LOLBAS (https://lolbas-project.github.io/)

Come From

https://wiki.c2.com/?ComeFrom
1•pramodbiligiri•51s ago•0 comments

Steal Claude Code Architecture

https://teamcal.ai/blog/claude-code-architecture
1•rajl•3m ago•0 comments

How to build advanced features for AI chatbots on SSE

https://zknill.io/posts/everyone-said-sse-token-streaming-was-easy/
1•zknill•7m ago•0 comments

Show HN: VibeBrowser – Give your AI agent your real logged-in browser via MCP

https://www.vibebrowser.app/mcp
1•denis4inet•7m ago•0 comments

Show HN: Financial Database API for Vibe Coders

https://xfinlink.com
1•lyonghee97•15m ago•1 comments

Hotta GameDriverX64.sys shipping in Neverness to Everness preload

https://github.com/LaggyTMD/nte-driver-analysis
1•LaggyTMD•16m ago•0 comments

Anthropic Claude Code HERMES.md billing flaw

https://consumerrights.wiki/w/Anthropic_Claude_Code_HERMES.md_billing_flaw
1•Palmik•17m ago•0 comments

Scraping 241 UK council planning portals – 2.6M decisions so far

19•mebkorea•22m ago•9 comments

Show HN: BeVisible.app - Blog that runs itself

https://www.bevisible.app
2•evanyang•25m ago•0 comments

Xiaomi MiMo Orbit: 100T Token Grant for Builders

https://100t.xiaomimimo.com/
1•whtsky•26m ago•0 comments

SwiftBash: Pure-Swift, sandboxed bash interpreter

https://github.com/cocoanetics/swiftbash
2•ingve•26m ago•0 comments

Text Is the New Binary

https://andreabaccega.com/blog/text-is-the-new-binary/
2•veke87•29m ago•0 comments

Bugs in the original 1977 Cave Adventure Fortran source

https://colossalcave.cc/bugs.php
2•ultra-nick•32m ago•1 comments

A case report of someone who self-managed Fatal Familial Insomnia

https://pmc.ncbi.nlm.nih.gov/articles/PMC1781276/
1•abinaryquibit•32m ago•1 comments

Asimov v1: Open-Source Humanoid Robot

https://github.com/asimovinc/asimov-v1
1•Philipp2398•33m ago•0 comments

I built a coach for people who are tired of being yelled at by Stockfish

https://chessmentorai.com/en
1•sepiropht•34m ago•0 comments

Set a Meeting Budget

https://alexhans.github.io/posts/meeting-budget.html
2•alexhans•37m ago•1 comments

Ask HN: When might we not have to do laundry or fold clothes or cook

2•samarthv•39m ago•0 comments

Google signs classified AI deal with Pentagon

https://www.reuters.com/technology/google-signs-classified-ai-deal-with-pentagon-information-repo...
5•afshinmeh•40m ago•2 comments

The 278k language running 20% of the Internet

https://www.ismatsamadov.com/blog/lua-278k-language-running-the-internet
1•ismats•41m ago•0 comments

Unitree G1 humanoid robot roller skating [video]

https://www.youtube.com/watch?v=srPz8TRpZ_8
1•nathanh4903•43m ago•0 comments

Humanoid robots to become baggage handlers in Japan airport experiment

https://www.theguardian.com/world/2026/apr/28/humanoid-robots-baggage-handlers-japan-airports
3•calcifer•48m ago•0 comments

Japan awakens to Radio Taiso exercise tradition. One face of country's longevity

https://apnews.com/article/radio-taiso-c4faaf9abb045b3f25d3fda2779943bb
2•petethomas•49m ago•0 comments

The Fallen Apple

https://mattgemmell.scot/the-fallen-apple/
2•mpweiher•49m ago•0 comments

Show HN: An Agent-First Collaboration Platform Inspired by Karpathy's AgentHub

https://community.computer/
2•lftherios•50m ago•0 comments

Will AI destroy the economy? [video]

https://www.youtube.com/watch?v=DBvrwWoyYQM
1•aluket•51m ago•0 comments

Elon Musk and Sam Altman are going to court over OpenAI's future

https://www.technologyreview.com/2026/04/27/1136466/elon-musk-and-sam-altman-are-going-to-court-o...
3•joozio•53m ago•0 comments

There's no such thing as the petrodollar

https://www.ft.com/content/be345914-7b4b-4264-bcbd-6e5e33b798c7
2•helsinkiandrew•54m ago•0 comments

EU tells Google to open up AI on Android; Google says "unwarranted intervention"

https://arstechnica.com/ai/2026/04/europe-could-force-google-to-open-android-to-other-ai-assistants/
7•vrganj•57m ago•0 comments

Show HN: Built a local-first way to make AI context reusable across tools

https://www.proxvanta.com/
1•bonjourmr•1h ago•0 comments