domgolonka / foretokenLinks
A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.
☆20Updated last year
Alternatives and similar repositories for foretoken
Users that are interested in foretoken are comparing it to the libraries listed below
Sorting:
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆13Updated 2 years ago
- Multi-threaded socks proxy checker written in Go!☆45Updated 4 years ago
- Small Helper Library to increase automatically the file descriptors limits for the current process☆24Updated 2 years ago
- Hybrid memory/disk map☆58Updated last week
- ☆33Updated 5 years ago
- A Go library to convert various file formats to plaintext and provide related functions☆66Updated 5 years ago
- Golang Implant & Post-Exploitation Framework☆59Updated 2 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- roundrobin with configurable rotating strategies☆14Updated 2 years ago
- IP/FQDN data structure helper with randomization of hosts and ports based on masscan internal logic☆67Updated last year
- A command based package for simple display of statistics☆25Updated 9 months ago
- Network Policy Helper☆22Updated this week
- Hack tools coded in golang☆20Updated last year
- gozero: the wannabe zero dependency runtime for Go developers (experimental)☆21Updated last month
- A fast port scanner written in go with a focus on reliability and simplicity.☆17Updated 10 months ago
- A Target Tracking , NoteTaking , CheckLists and Data Management GUI App for Bug Hunter's and Pentesters.☆43Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Updated 2 years ago
- Tiny embeddable dns server☆51Updated this week
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- Dialer with DNS Cache + Dial History☆66Updated this week
- Burp Suite Extension useful to inspect UPnP security☆16Updated 3 years ago
- Shellcode process injector☆28Updated 5 years ago
- Free listening port from the OS☆29Updated 9 months ago
- Modular C2 server to tame your pack of wolves☆19Updated last week
- React UI☆11Updated 2 years ago
- Red Team C2 and Post Exploitation code☆37Updated last month
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- Parse SPF record and determine if client IP is allowed to send email.☆32Updated 4 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago