Skip to content

Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques

License

Notifications You must be signed in to change notification settings

Jsmoreira02/CatBinaries

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

logo-removebg-preview

CatBinaries

License: GPL-2.0

This project is strongly inspired by the GTFO bins project. Built for lazy hackers (like me) who prefer to do everything in one place

Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques. The tool is designed to exploit, identify and list all binaries deconfigured for privilege exploitation: Binaries with SUID, Capabilities, SUDO privileges, reading privileged files.

GTFOBins is a community-driven project that aims to collect Unix binaries that can be abused for privilege escalation. Each entry in the GTFOBins database provides detailed information about a specific binary, including its functionality, potential vulnerabilities, and instructions on how to exploit it to gain escalated privileges. The database serves as a valuable resource for security researchers and system administrators.

Upload directly to the target machine:

curl https://raw.githubusercontent.com/Jsmoreira02/CatBinaries/refs/heads/main/CatBinaries.sh -o /tmp/CatBinaries.sh

Identify Vulnerable Binaries - Outdated video:

Gravaratela_20240815_195946online-video-cutter com-ezgif com-video-to-gif-converter

Exploit Methods:

  • SUID: If the binary has the SUID bit set, it can be exploited to give the highest privilege on Linux/Unix

  • Sudo Binaries: If the binary is allowed to run as superuser by sudo, it can be exploited to give the highest privilege on Linux/Unix

  • Capabilities: Exploit CAP_SETUID capability

  • Reverse Shell: Remote connection

  • File Read: It reads data from files, it may be used to do privileged reads

New techniques and mechanics:

❗ Now you can add the full/custom path of the binary or sudo as a prefix. ❗:

  • The script will recognize the binary and use the normally selected exploit method, but more versatile and new options to exploit the target

    Examples:

    • Sudo prefix:


Gravaodetelade2025-02-2202-03-44-ezgif com-video-to-gif-converter


  • Custom PATH:


Gravaodetelade2025-02-2202-25-40-ezgif com-video-to-gif-converter


New Features:

  • COMING SOON: New form of exploitation: Library Load
  • COMING SOON: Clearing the tracks feature

  • This script will constantly receive new binaries and forms of exploitation

Captura de imagem_20240815_202247

Check out the source of inspiration

Warning:

I am not responsible for any illegal use or damage caused by this tool. It was written for fun, not evil and is intended to raise awareness about cybersecurity.

About

Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques

Topics

Resources

License

Stars

Watchers

Forks

Languages