emperorcow / go-netscan
☆33Updated 4 years ago
Alternatives and similar repositories for go-netscan:
Users that are interested in go-netscan are comparing it to the libraries listed below
- Rosie the Pivoter☆17Updated 6 years ago
- Shellcode process injector☆27Updated 4 years ago
- DNS server for pentesters☆49Updated 3 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆19Updated 3 years ago
- A golang library designed to interact with Metasploit☆43Updated 3 years ago
- Network Finger Printer☆16Updated 7 years ago
- ☆20Updated 6 years ago
- Hacky linux memory probe. Yara or Regex scan process memory☆11Updated 10 months ago
- Utility to inject honey tokens into lsass.☆27Updated 7 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Implements io.ReaderAt over raw memory.☆13Updated 4 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18Updated 5 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated last year
- A framework for exploiting padding oracles in network-based applications☆26Updated last year
- Keyhack - Golang API token/webhook validator☆16Updated 5 years ago
- A logging ASKPASS binary☆29Updated 4 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- various slides and presentations I've worked on☆18Updated 11 months ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Updated 2 years ago
- Tool scan EternalBlue by golang☆22Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆58Updated 6 years ago
- Protect your servers with a secret header☆28Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- Is this IP a C2 server?☆28Updated 4 years ago
- Provides access to libhashcat☆30Updated 9 months ago
- Library of traffic redirectors☆26Updated 4 years ago