Browse a curated list of Unix binaries that can help bypass local security restrictions in misconfigured systems. Useful for security testing and research.
Discover security bypass techniques with Unix tools
GTFOBins offers a well-organized collection of Unix binaries that can be exploited to bypass local security controls when systems are misconfigured. If you're exploring system security, penetration testing, or researching privilege escalation, this site provides practical examples and command snippets for a wide range of common Unix utilities.
You can easily search for specific binaries or browse by technique, such as file reading, privilege escalation, or reverse shells. Each entry explains how the binary can be used in different security contexts, making it a valuable resource for ethical hackers, security professionals, and anyone interested in understanding system vulnerabilities.
Whether you're learning about security flaws or need quick references for your assessments, GTFOBins helps you identify and understand potential risks in Unix environments.
Discover websites similar to Gtfobins.github.io. Section 1 prioritizes sites with matching domain extensions and/or languages. Section 2 offers worldwide alternatives.
Learn about Thunderbolt 3 security risks, view demos, and access tools to check if your device is vulnerable to Thunderspy attacks and how to protect it.
Explore open-source intelligence and cyber security tools, research, and resources focused on offensive OSINT techniques and surveillance insights.
Explore detailed guides and references for the Julia programming language, designed for high-performance scientific and numerical computing.
Explore and document architectural decisions for software projects with clear records, templates, and best practices to improve project knowledge sharing.
Discover how to earn rewards and monetize your experience in the EvoSim Universe with this guide to digital adventure and in-game opportunities.
Find answers, get help, and connect with others on the Kkutu.io customer service portal. Access FAQs, guides, and support for players in Korean.
HackMD lets you write, edit, and share notes in Markdown with others in real time, making it easy to collaborate and organize your ideas online.
BIDS is a community-driven platform that provides a standard for organizing and sharing neuroimaging and behavioral data to simplify research collaboration.
Explore hands-on hacking labs and resources for security researchers, bug hunters, and pentesters to learn, test, and share cybersecurity skills.
Read in-depth articles on Windows security, pentesting, and vulnerability research, with guides, walkthroughs, and technical insights for security enthusiasts.
Personal site of Filippo Valsorda, a cryptography engineer sharing expertise, projects, and insights on open source and security topics.
Find open-source standards and conventions for creating and maintaining Red Hat product documentation, all in one freely accessible resource.
Dortania offers clear guides and documentation to help you set up and troubleshoot Hackintosh systems and related tech projects.
Fibery is a flexible platform for teams to manage projects, automate workflows, and collaborate—all in a customizable, no-code workspace.
protocols.io is a secure platform where you can create, share, and organize research methods, making collaboration and reproducibility easy.
Explore programming and math projects, tutorials, and resources created by a Toronto-based developer. Great for learning and discovering new ideas.
Find up-to-date documentation and guides for HTML, CSS, JavaScript, and more web technologies. Share knowledge and connect with other web developers.
Find guides, tutorials, and updates for using the ADS academic search platform. Get answers to questions and learn how to make the most of its features.
A Chinese-language documentation site offering guides, FAQs, and resources for Android app setup, configuration, and support, including Nekobox.
Readwise helps you remember and revisit your favorite highlights from Kindle, Instapaper, and more by sending daily emails with your saved notes.
Explore details on over 1,000 database management systems, compare features, and learn about the latest in database technology all in one place.
ConceptNet is a free semantic network that helps computers understand word meanings, offering an open resource for language, AI, and research projects.
Get answers and support for the Alcoholics Anonymous Meeting Guide app, including help finding meetings and connecting with the recovery community.
Discover resources, tools, and insights to help you build trustworthy AI. Learn from educational content, research, and methods for reliable AI systems.
Explore resources, solutions, and materials from the book “Mathematics for Machine Learning” to support your study of math and machine learning concepts.
Share, manage, and discover datasets for free. Create groups, register data, and connect with communities on this open data platform.
Planio offers online project management and team collaboration tools, including Redmine hosting, task tracking, file sharing, and a built-in wiki.
Explore the Brain Imaging Data Structure (BIDS) specification site for clear guidelines on organizing and describing brain imaging research data.
ShEx offers resources and tools for working with Shape Expressions, a schema language for describing and validating RDF graph data structures.
Explore and collaborate on public documents with DocumentCloud's open source tools for document analysis, annotation, and sharing.
Find practical notes and resources on red teaming and offensive security to support learning, research, and hands-on cybersecurity activities.
Explore a comprehensive database of public exploits, shellcode, and security research for ethical hacking, penetration testing, and cybersecurity learning.
Personal site of Moritz Lipp, security researcher, sharing research on microarchitectural attacks, open-source projects, publications, and presentations.
Phrack Magazine shares articles, research, and news about hacking, cybersecurity, and digital underground topics for tech enthusiasts and researchers.
Explore legal and ethical hacking, security advisories, and independent research focused on information security and vulnerability disclosures.
Vulnerability Lab shares research on security vulnerabilities, bug bounty programs, and responsible disclosure for ethical hackers and researchers.
MalwareBazaar lets you search, share, and download malware samples for research and threat analysis. Designed for cybersecurity professionals and researchers.
Explore offensive security tools and in-depth research to support your red teaming and cybersecurity testing activities. Resources for security professionals.
Packet Storm offers cybersecurity news, tools, exploits, advisories, and whitepapers for security professionals and enthusiasts to stay updated and informed.
Explore and learn about Kali Linux's suite of penetration testing and ethical hacking tools, complete with documentation and community support.