๐Ÿ”ฎ
P4n1cBook
  • ๐Ÿดโ€โ˜ ๏ธWelcome!
    • ๐Ÿ”ฎP4n1cBook
    • ๐Ÿ“šBookmarks
    • ๐ŸšจLicence and Disclaimer
  • Fundamentals
    • Starter Kit
      • Linux
      • PowerShell
      • Git
      • ๐Ÿ’พRegex
      • Network Analysis
        • curl
        • tcpdump
        • Nmap
        • ๐ŸฆˆWireshark
      • Metasploit
    • ๐ŸŒNetwork Protocols
      • ICMP
      • SSH
      • Telnet
      • DNS
      • FTP
      • HTTP/HTTPS
      • SMB
      • SNMP
      • SMTP
      • NFS
      • IPP
      • WinRM
      • LLMNR
      • JDWP
    • Code
      • Python Essentials
      • C & C++
    • Web APIs
      • GraphQL
    • Shells/TTYs
    • Dorks
    • Cryptography
    • Reverse Engineering
      • GDB
      • Binaries
  • Web Exploitation
    • Web Enumeration
      • User Endpoints
      • Web Fuzzing
        • ffuf
        • feroxbuster
        • Gobuster
        • GoWitness
      • Web Servers
        • Apache
        • Nginx
        • Werkzeug
      • Databases
        • MySQL
        • NoSQL
          • MongoDB
          • Redis
      • Web Services/Frameworks
        • Wordpress
        • Laravel
        • Express
        • Magento
        • AIOHTTP
        • HashiCorp Vault
        • Tiny File Manager
        • Joomla
        • CMS Made Simple
        • ๐ŸŒตCacti
        • Tomcat
        • Zabbix
        • OpenNetAdmin
        • ImageMagick
    • Vulnerabilities
      • Arbitrary File Read
      • Session Hijacking
      • SSRF
      • Eval Injection
      • Template Manipulation
      • Path Traversal
      • Prototype Pollution
      • XXE
      • Deserialization
      • Log Poisoning
      • Arbitrary Command Execution
      • SQLi
        • SQLmap
      • SSI
      • SSTI
      • LFI
      • XSS
    • Java-based web application
      • Struts
      • .WAR
      • pd4ml.jar
  • Cloud Exploitation
    • Kubernetes
    • AWS
  • Post Exploitation
    • File Transfer
      • Exfiltration
    • Credential Dumping
      • Thunderbird
    • Lateral Movement
    • Persistence
    • Linux Privilege Escalation
      • Static Binaries
      • Enumeration
      • Hijacks
      • Command Injection
      • Jailbreaks
      • Binary Exploitation - Linux
      • Kernel Exploits
      • Buffer Overflow - Linux
      • Docker
      • Abusing Wildcards
  • Wireless Exploitation
    • NFC
Powered by GitBook
On this page
Edit on GitHub
  1. Post Exploitation
  2. Linux Privilege Escalation

Static Binaries

PreviousLinux Privilege EscalationNextEnumeration

Last updated 2 months ago

Detect the right Architecture

chisel
arch=$(uname -m)
[ "$arch" = "x86_64" ] && suffix="amd64" || suffix="386"
curl -sL "https://github.com/jpillora/chisel/releases/latest/download/chisel_linux_$suffix" -o chisel
chmod +x chisel
pspy
curl
curl -sL https://github.com/DominicBreuker/pspy/releases/latest/download/pspy32 -o pspy64
wget
wget https://github.com/DominicBreuker/pspy/releases/latest/download/pspy64 -O pspy64
Detect the right architecture
[ "$(uname -m)" = "x86_64" ] && pspy="pspy64" || pspy="pspy32" && curl -sL "https://github.com/DominicBreuker/pspy/releases/latest/download/$pspy" -o "$pspy" && chmod +x "$pspy"
linpeas
curl
curl -sL https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh -o linpeas.sh
wget
wget https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh -O linpeas.sh
nmap
curl
curl -sL https://github.com/andrew-d/static-binaries/raw/master/binaries/linux/x86_64/nmap -o nmap
wget
wget https://github.com/andrew-d/static-binaries/raw/master/binaries/linux/x86_64/nmap -O nmap
chisel
curl
curl -sL https://github.com/jpillora/chisel/releases/latest/download/chisel_linux_amd64 -o chisel
wget
wget https://github.com/jpillora/chisel/releases/latest/download/chisel_linux_amd64 -O chisel
socat
curl
curl -sL https://github.com/andrew-d/static-binaries/raw/master/binaries/linux/x86_64/socat -o socat
wget
wget https://github.com/andrew-d/static-binaries/raw/master/binaries/linux/x86_64/socat -O socat
ngrok
curl
curl -sL https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-amd64.zip -o ngrok.zip
wget
wget https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-amd64.zip -O ngrok.zip
busybox
curl
curl -sL https://busybox.net/downloads/binaries/1.35.0-x86_64-linux-musl/busybox -o busybox
wget
wget https://busybox.net/downloads/binaries/1.35.0-x86_64-linux-musl/busybox -O busybox
Python
curl
curl -sL https://github.com/andrew-d/static-binaries/raw/master/binaries/linux/x86_64/python -o python
wget
wget https://github.com/andrew-d/static-binaries/raw/master/binaries/linux/x86_64/python -O python
static-binaries/binaries/linux at master ยท andrew-d/static-binariesGitHub
Logo