GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
-
Updated
Sep 17, 2025 - HTML
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Living Off The Land (LOTL) persistent Reverse shell
Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.
an undetected (by windows defender, AMSI, and malwarebytes) powershell reverse shell based off of hoaxshell - with firewall bypass
Open a reverse shell in a web page using HTTP
CS Tool is a complete cybersecurity website guide with all cyber security-related information such as different cyber threats and how to prevent these threats. Also, we provide cyber security testing/hacking tools including a Keylogger, Text encryption-decryption, Mac Address changer, Reverse Shell Attack, Image Steganography and Risk Calculator.
Pentest framework with in browser UI
Curated list of Unix binaries that can be exploited to bypass system security restrictions
Basic python scripts and reverse shell programs
Collection of LOL items from these popular opensource projects: LOLBAS, GTFOBins, WADComs, and PayloadAllTheThings
Vulnerable Flask E-Commerce Cyber Security Group 120
CTF writeups, basically
From zero to shell — my journey into hacking and code
mshta exploit to gain reverse shell access
Writeup ViII Jornadas Nacionales de Investigación (JNIC 2023). Equipo: Sergio Pérez Peló, Raúl Martín Santamaría e Isaac Lozano Osorio.
Answers, tips and tricks for different CTFs
Add a description, image, and links to the reverse-shell topic page so that developers can more easily learn about it.
To associate your repository with the reverse-shell topic, visit your repo's landing page and select "manage topics."