An open API service indexing awesome lists of open source software.

https://github.com/jsmoreira02/catbinaries

Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques
https://github.com/jsmoreira02/catbinaries

gtfobins hacking hacking-tool linux-security privilege-escalation shell-script

Last synced: 8 months ago
JSON representation

Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques

Awesome Lists containing this project

README

          

![logo-removebg-preview](https://github.com/user-attachments/assets/cb5e882f-c212-4d60-946b-d029f1d72ad1)

# CatBinaries



[![License: GPL-2.0](https://img.shields.io/badge/License-GPL--2.0-blue.svg)](https://opensource.org/licenses/GPL-2.0)




**This project is strongly inspired by the GTFO bins project. Built for lazy hackers (like me) who prefer to do everything in one place**

Tool to make privilege escalation on linux systems easier, using GTFObins (get the f*** out Binaries) techniques. The tool is designed to exploit, identify and list all binaries deconfigured for privilege exploitation: Binaries with SUID, Capabilities, SUDO privileges, reading privileged files.

> GTFOBins is a community-driven project that aims to collect Unix binaries that can be abused for privilege escalation. Each entry in the GTFOBins database provides detailed information about a specific binary, including its functionality, potential vulnerabilities, and instructions on how to exploit it to gain escalated privileges. The database serves as a valuable resource for security researchers and system administrators.

## Upload directly to the target machine:
```bash
curl https://raw.githubusercontent.com/Jsmoreira02/CatBinaries/refs/heads/main/CatBinaries.sh -o /tmp/CatBinaries.sh
```

## Identify Vulnerable Binaries - Outdated video:
![Gravaratela_20240815_195946online-video-cutter com-ezgif com-video-to-gif-converter](https://github.com/user-attachments/assets/8f154db1-bf71-44d0-8469-361c36697d86)

## Exploit Methods:
- **SUID**: If the binary has the SUID bit set, it can be exploited to give the highest privilege on Linux/Unix

- **Sudo Binaries**: If the binary is allowed to run as superuser by sudo, it can be exploited to give the highest privilege on Linux/Unix

- **Capabilities**: Exploit CAP_SETUID capability

- **Reverse Shell**: Remote connection

- **File Read**: It reads data from files, it may be used to do privileged reads

##

## New techniques and mechanics:

#### ❗ Now you can add the full/custom path of the binary or sudo as a prefix. ❗:
- The script will recognize the binary and use the normally selected exploit method, but more versatile and new options to exploit the target

### Examples:

- #### Sudo prefix:

--------------------------------

![Gravaodetelade2025-02-2202-03-44-ezgif com-video-to-gif-converter](https://github.com/user-attachments/assets/947e4027-2600-4be4-aa1c-c5f9f0f73a44)

--------------------------------
- #### Custom PATH:

--------------------------------

![Gravaodetelade2025-02-2202-25-40-ezgif com-video-to-gif-converter](https://github.com/user-attachments/assets/eacc4ff9-a6db-4564-b606-5d518c64bf2e)

--------------------------------

## New Features:

- ⏰ **COMING SOON**: New form of exploitation: Library Load
- ⏰ **COMING SOON**: Clearing the tracks feature
##

- This script will constantly receive new binaries and forms of exploitation

![Captura de imagem_20240815_202247](https://github.com/user-attachments/assets/45e90ab7-1c7d-42e7-b555-2d0099db3a0a)

## Check out the source of inspiration

- [GTFOBins Page](https://gtfobins.github.io/)
- [@GTFOBins](https://github.com/GTFOBins)

# Warning:
> I am not responsible for any illegal use or damage caused by this tool. It was written for fun, not evil and is intended to raise awareness about cybersecurity.