0c34 / govwaView external linksLinks
☆185Feb 20, 2025Updated 11 months ago
Alternatives and similar repositories for govwa
Users that are interested in govwa are comparing it to the libraries listed below
Sorting:
- Web application build Golang with Vulnerability☆253Dec 16, 2022Updated 3 years ago
- A very vulnerable serverless application in AWS Lambda☆98Oct 7, 2019Updated 6 years ago
- Awesome Golang Security resources 🕶🔐☆1,961Jun 5, 2024Updated last year
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Go-sec-code is a project for learning Go vulnerability code.☆50Mar 11, 2023Updated 2 years ago
- Golang eBPF RASP☆10Jul 19, 2023Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- A lab to play with authentication and authorisation problems☆98Mar 7, 2023Updated 2 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Jun 18, 2018Updated 7 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- laravel 5.8 rce pop chain☆26Oct 27, 2019Updated 6 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Files for http://deniable.org/windows/windows-callbacks☆26Jul 9, 2020Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Apr 19, 2017Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- The Most Comprehensive Docker Security Scanner☆1,511Updated this week
- Metasploit Framework☆26Updated this week
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- Rapid Attack Infrastructure (RAI)☆310Nov 24, 2024Updated last year
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 2 months ago
- Issues to consider when planning a red team exercise.☆619Aug 23, 2017Updated 8 years ago
- Golang for Security Professionals☆1,823Feb 15, 2020Updated 5 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,117Apr 21, 2024Updated last year
- ☆46Sep 28, 2017Updated 8 years ago
- Encode powershell payload into bat files☆155Feb 1, 2018Updated 8 years ago
- A REST API security testing framework.☆327Dec 4, 2021Updated 4 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆261Oct 18, 2017Updated 8 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,484Oct 12, 2024Updated last year
- Go security checker☆8,651Feb 7, 2026Updated last week
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- Damn Vulnerable Thick Client App☆154Jul 16, 2020Updated 5 years ago
- CentOS Control Web Panel, Root Privilege Escalation☆67Oct 25, 2019Updated 6 years ago