nishitm / goBox
GO sandbox to run untrusted code
☆42Updated 5 years ago
Alternatives and similar repositories for goBox:
Users that are interested in goBox are comparing it to the libraries listed below
- the puppy proxy☆22Updated 4 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Keyhack - Golang API token/webhook validator☆16Updated 3 weeks ago
- ☆16Updated 4 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50Updated 2 years ago
- extracts urls from text☆16Updated 6 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- ☆33Updated 4 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- dev level ;-)☆10Updated 6 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- A sub-domain reconnaissance written in golang☆12Updated 7 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆18Updated 7 years ago
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 4 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Hostname filtering for arbitrary network protocols☆22Updated 4 months ago
- medium interaction postgresql honeypot☆11Updated 8 months ago
- Given a string determine the possible hashing algorithms used to produce that string.☆18Updated 4 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Go static analysis tool that checks for security issues using an AST.☆28Updated 6 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆77Updated last year
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- CIDR to IP List Tool☆14Updated 9 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Encryption Abstraction Layer and Utilities for ratnet☆18Updated 11 months ago