1
0
mirror of https://github.com/GTFOBins/GTFOBins.github.io.git synced 2024-09-20 19:01:59 +02:00
This commit is contained in:
Andrea Cardaci 2018-05-29 19:30:39 +02:00
parent d8c9db3561
commit ef6bf6dfbe
4 changed files with 17 additions and 1 deletions

View File

@ -13,7 +13,8 @@
{% endif %}
{% endif %}
</title>
<link rel="stylesheet" href="/style.css" type="text/css"/>
<link rel="icon" href="/assets/logo.png">
<link rel="stylesheet" href="/assets/style.css" type="text/css"/>
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=5.0, user-scalable=yes">
<script async defer src="https://buttons.github.io/buttons.js"></script>
</head>

BIN
assets/logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.1 KiB

View File

@ -16,6 +16,10 @@ $layout-break: "(min-width: #{$column-width + $grace-space})";
width: $column-width;
margin: 40px auto;
}
p {
text-align: justify;
}
}
@media not all and #{$layout-break} {
@ -161,6 +165,15 @@ h2, h3, h4, h5, h5 {
// other classes
.logo {
$margin: 20px;
float: right;
width: 100px;
height: 100px;
margin-left: $margin;
margin-bottom: $margin;
}
.bin-name {
font-family: monospace;
font-size: 1.2rem;

View File

@ -3,6 +3,8 @@ layout: page
title: GTFOBins
---
<img class="logo" src="/assets/logo.png"/>
GTFOBins is a curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.
The project collects legitimate Unix binaries that can be abused to <strike>get the f**k</strike> break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate the other post-exploitation tasks. See the full list of [functions](/functions/).