This article discusses privilege escalation in Linux by using binaries like GTFOBins or GTFOBinaries.GTFOBins provides a list of binaries and commands that can be exploited for privilege escalation.GTFOBins also provides detailed information about each binary and the required user privileges for execution.Privilege escalation involves exploiting vulnerabilities in a system to obtain higher levels of access.There are two types of privilege escalation- horizontal and vertical.Misconfigurations like improper SUID/SGID settings or over-privileged sudo rights can lead to security vulnerabilities.GTFOBins is an open-source initiative and is constantly evolving to include the latest binaries and techniques.Some possible ways to exploit SUID binaries include shared object injection and environment variable exploitation.Improperly configured Sudo can also lead to privilege escalation.Path injection and Linux capabilities misconfigurations can also be exploited for privilege escalation.