Goca Scanner
☆330Oct 11, 2023Updated 2 years ago
Alternatives and similar repositories for goca
Users that are interested in goca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security checks for http headers and cookies☆27Feb 11, 2021Updated 5 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆138Jun 6, 2019Updated 6 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 6 months ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- Interactive Network Scanner☆1,039Oct 21, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- ☆25May 9, 2021Updated 4 years ago
- Burp Commander written in Go☆55Feb 11, 2019Updated 7 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆37Feb 11, 2020Updated 6 years ago
- ☆128May 22, 2023Updated 2 years ago
- Declarative penetration testing orchestration framework☆296Dec 20, 2019Updated 6 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,083Apr 5, 2022Updated 4 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆92Dec 8, 2022Updated 3 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,561Oct 17, 2022Updated 3 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆704Feb 24, 2024Updated 2 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- locate and attack Lync/Skype for Business☆345Oct 1, 2024Updated last year
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆28Dec 28, 2017Updated 8 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- A Comprehensive Web Fuzzer and Content Discovery Tool☆552Jul 21, 2023Updated 2 years ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search eng…☆376Feb 4, 2024Updated 2 years ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A highly configurable Framework for easy automated web scanning☆382Jul 13, 2020Updated 5 years ago
- A toolkit to attack Office365☆1,119Nov 6, 2020Updated 5 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆379Aug 13, 2021Updated 4 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 8 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆249Jun 19, 2024Updated last year
- Sustainable shellcode evasion☆113Mar 20, 2026Updated 3 weeks ago