Kind of weird to list every program that reads an input file with higher privleges under sudo or suid. That's like almost every program, and kind of the entire point of sudo/suid.
A lesser known trick, which is not listed here, is that you can use dd to get arbitrary code execution by writing to /proc/<pid>/mem.
>If the binary is allowed to run as superuser by sudo, it does not drop the elevated privileges and may be used to access the file system, escalate or maintain privileged access.<p>Wat. If you add someone to wheel, they may abuse those privileges. Is this really something that needs pointing out?
There are many other useful tidbits that you may not necessarily know but this one struck me as a bit odd.
Preparing for the OSCP exam I make extensive use of GTFOBins.<p>Also LOLBAS (Living Off The Land Binaries and Scripts (and also Libraries)<p>:)
<a href="https://lolbas-project.github.io/#" rel="nofollow">https://lolbas-project.github.io/#</a>
When I played hackthebox.eu I made extensive use of this :D<p>And that's when you realize how many websites there are out there that make simple attacks so much easier.
Also, from nethack, too. If your build has set to read mail, you can fire up the mail reader by reading an ingame scroll (I am not kidding), and then spawning a shell from mail(1)/nail(1) or mutt with urlview it's really easy.
the answer is all of them. This website can be replaced by `ls /**/*bin`. any program which does anything nontrivial that you call with sudo is going to let you do something with root privileges you couldn't otherwise do.