Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> It is important to note that this is not a list of exploits, and the programs listed here are not vulnerable per se, rather, GTFOBins is a compendium about how to live off the land when you only have certain binaries available.


You can directly map most of the tags into a libc function clall combination, like the "Command" tag is just programs that run user input into a system() call. Even for programs where this is their primary function. It has nothing to do with "bypassing".

The author is making a security theater out of nothing for posing.


The point is to get to these functionality from a limited set of shell commands, not to get to this functionality from an arbitrary executable.

> The author is making a security theater out of nothing for posing.

Again, the author is not making accusations of security flaws. I don't know how they could have described it better, but the author was going for something very narrow and specific.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: