porthunter / gosploitLinks
Exploit framework written in Go
β29Updated 7 years ago
Alternatives and similar repositories for gosploit
Users that are interested in gosploit are comparing it to the libraries listed below
Sorting:
- Go-deliver is a payload delivery tool coded in Go.β115Updated 7 years ago
- π A concurrent, command-line AWS S3 Fuzzer. Written in Go.β45Updated 7 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.β58Updated 8 years ago
- A Go library which main purpose is giving an interface to loop over a dictionary and use those words/lines as input for some custom logicβ¦β56Updated 8 years ago
- Phishing toolkit for red teams and pentesters.β126Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.β44Updated 2 years ago
- IPV6 MITM attack toolβ92Updated 12 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interfaceβ88Updated 4 months ago
- StΓ¦kka Metasploit - Extenting Metasploitβ54Updated 8 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendlyβ63Updated 2 years ago
- Cronbased Dirty Cow Exploitβ31Updated 8 years ago
- Trivial unixey pentest utilitiesβ57Updated last year
- Golang-based subdomain miner leveraging certificate transparency logsβ76Updated 2 years ago
- A collection of offensive tools I've hacked together for CTFs and suchβ20Updated 9 years ago
- Search Nmap and Metasploit scanning scripts.β55Updated 7 years ago
- Firecat is a penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network.β134Updated 9 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreterβ118Updated 2 years ago
- Simple SSH brute-forcer written in Goβ21Updated 9 years ago
- extracts urls from textβ16Updated 7 years ago
- Backdoor with Golang (Cross-Plateform)β17Updated 3 years ago
- A Golang covert backdoor using raw sockets.β36Updated 6 years ago
- Pure HTTP and DNS Botnet written in Golang for Windows.β155Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphsβ41Updated 7 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocolβ53Updated 7 years ago
- ssh session type for metasploitβ100Updated 2 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco toolsβ41Updated 8 years ago
- A bunch of scripts used for network defense during competitions.β15Updated 10 years ago
- A vulnerable LDAP based web app written in Golangβ83Updated last year
- Command line wrapper, Library, and Rest API for oclHashcat.β42Updated 9 years ago
- DNS Botnet Server and Clientβ35Updated 6 years ago