gocaio / goca
Goca Scanner
☆329Updated last year
Alternatives and similar repositories for goca:
Users that are interested in goca are comparing it to the libraries listed below
- nextnet is a pivot point discovery tool written in Go.☆448Updated 4 years ago
- Respounder detects presence of responder in the network.☆315Updated 5 years ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆452Updated this week
- Go Web Application Penetration Test☆344Updated 6 months ago
- Shodan API client☆215Updated 3 years ago
- Golang reverse/bind shell generator☆229Updated 3 years ago
- Declarative penetration testing orchestration framework☆290Updated 5 years ago
- An XSS reverse shell framework☆306Updated 6 years ago
- goddi (go dump domain info) dumps Active Directory domain information☆430Updated 2 years ago
- blacksheepwall is a hostname reconnaissance tool☆301Updated 4 years ago
- a CLI for ephemeral penetration testing☆12Updated 5 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆179Updated 2 years ago
- Hawkeye filesystem analysis tool☆235Updated 6 years ago
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- Domain name permutation engine written in Go☆263Updated last year
- A polyglot payload generator☆239Updated 2 years ago
- Gorecon is a All in one Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool that every pentester/bughunter might wanna c…☆272Updated 3 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 2 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆694Updated last year
- Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.☆526Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 9 months ago
- locate and attack Lync/Skype for Business☆335Updated 5 months ago
- Nmap XML parsing library for Go☆100Updated 2 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆373Updated 3 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆248Updated 5 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆220Updated 4 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago