evilsocket / islazyLinks
A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.
☆162Updated 3 years ago
Alternatives and similar repositories for islazy
Users that are interested in islazy are comparing it to the libraries listed below
Sorting:
- Mass scanning the internet (http and https) using a raw tcpstack.☆58Updated 8 years ago
- A Go library which main purpose is giving an interface to loop over a dictionary and use those words/lines as input for some custom logic…☆56Updated 8 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆87Updated 9 months ago
- The Swiss Army knife for backend engineers.☆95Updated 4 years ago
- Drupal Honeypot☆58Updated 6 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆86Updated 4 years ago
- A sub-domain reconnaissance written in golang☆12Updated 8 years ago
- Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆74Updated 2 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- elf-strings will programmatically read an ELF binary's string sections within a given binary. This is meant to be much like the strings U…☆140Updated 7 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆105Updated 4 years ago
- Shodan API client☆216Updated 4 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 8 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆182Updated 3 years ago
- Go library for connecting to CertStream☆156Updated 3 years ago
- [ceased maintenance] An open source alternative to burp suite written in Go.☆157Updated 6 years ago
- Competition Infrastructure Management☆88Updated 4 years ago
- blacksheepwall is a hostname reconnaissance tool☆302Updated 5 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Updated 5 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆111Updated 7 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆65Updated 7 years ago
- Firecat is a penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network.☆135Updated 10 years ago
- Hawkeye filesystem analysis tool☆242Updated 7 years ago
- Go library to trace Linux syscalls using the FTRACE kernel framework.☆82Updated 7 years ago
- For importing, searching, and managing public password breach data☆160Updated 2 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Pure HTTP and DNS Botnet written in Golang for Windows.☆156Updated 8 years ago