gocaio / gocaLinks
Goca Scanner
☆328Updated last year
Alternatives and similar repositories for goca
Users that are interested in goca are comparing it to the libraries listed below
Sorting:
- Respounder detects presence of responder in the network.☆317Updated 6 years ago
- Declarative penetration testing orchestration framework☆292Updated 5 years ago
- Go Web Application Penetration Test☆348Updated 10 months ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆454Updated this week
- nextnet is a pivot point discovery tool written in Go.☆450Updated 4 years ago
- Shodan API client☆214Updated 3 years ago
- An XSS reverse shell framework☆309Updated 6 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆181Updated 3 years ago
- blacksheepwall is a hostname reconnaissance tool☆304Updated 5 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- Domain name permutation engine written in Go☆268Updated last year
- Hawkeye filesystem analysis tool☆236Updated 7 years ago
- For importing, searching, and managing public password breach data☆162Updated last year
- framework to rapidly implement custom droppers for all three major operating systems☆699Updated last year
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- Open source offensive security platform for red team, by red team.☆386Updated 7 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆429Updated 3 years ago
- ☆143Updated 6 years ago
- Golang reverse/bind shell generator☆229Updated 3 years ago
- shellz is a small utility to manage your ssh, telnet, kubernetes, winrm, web or any custom shell in a single place.☆605Updated last year
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 2 years ago
- Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.☆533Updated 6 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆250Updated 5 years ago
- AI-based, context-driven network device ranking☆299Updated last year
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆251Updated last month
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆378Updated 5 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆187Updated last year