Goca Scanner
☆329Oct 11, 2023Updated 2 years ago
Alternatives and similar repositories for goca
Users that are interested in goca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security checks for http headers and cookies☆27Feb 11, 2021Updated 5 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- Interactive Network Scanner☆1,038Oct 21, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- ☆25May 9, 2021Updated 4 years ago
- Burp Commander written in Go☆56Feb 11, 2019Updated 7 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- ☆128May 22, 2023Updated 2 years ago
- Declarative penetration testing orchestration framework☆295Dec 20, 2019Updated 6 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,082Apr 5, 2022Updated 3 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,559Oct 17, 2022Updated 3 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆704Feb 24, 2024Updated 2 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,330Dec 6, 2023Updated 2 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- A Comprehensive Web Fuzzer and Content Discovery Tool☆552Jul 21, 2023Updated 2 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆376Feb 4, 2024Updated 2 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 5 years ago
- A highly configurable Framework for easy automated web scanning☆382Jul 13, 2020Updated 5 years ago
- A toolkit to attack Office365☆1,118Nov 6, 2020Updated 5 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆380Aug 13, 2021Updated 4 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 7 months ago