mytechnotalent / Go-HackingLinks
A FREE comprehensive online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Golang from scratch.
☆230Updated 2 years ago
Alternatives and similar repositories for Go-Hacking
Users that are interested in Go-Hacking are comparing it to the libraries listed below
Sorting:
- ☆133Updated 4 years ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆38Updated last year
- A command line tool to encode text and files into PNG images☆181Updated last year
- A monster cheatsheet on MITM attacks☆366Updated 5 months ago
- a practical introduction to Go☆96Updated last month
- Friendly graphical output of the nmap tool that allows filtering by open ports☆186Updated 3 years ago
- Free educational courses in reverse engineering, malware analysis, and programming☆463Updated 2 months ago
- ☆120Updated 10 months ago
- Golang weaponization for red teamers.☆513Updated last year
- Application Fuzzing: Tools, Techniques, and Best Practices☆168Updated last year
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆170Updated this week
- Репозиторий содержит список вопросов по наступальной безопасности.☆350Updated this week
- https://t.me/+V6d8SvKVFXo2MjIy☆42Updated 2 years ago
- ☆100Updated last year
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆91Updated 11 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆146Updated this week
- Light-weight web security scanner☆150Updated 7 months ago
- Ресурсы, связанные с безопасностью приложений, исследователями и разработчиками в области безопасности.☆51Updated 3 years ago
- A Go-based Exploit Framework☆367Updated this week
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆111Updated 2 years ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆327Updated 2 years ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆176Updated last year
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆327Updated 3 years ago
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆14Updated 11 months ago
- 🕸️ Crawl in the web network☆378Updated 7 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆100Updated last week
- My public notes about offensive security☆164Updated last month
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆210Updated 7 months ago
- Useful collection of scapy-scripts and more☆32Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆98Updated last year