vulncheck-oss / go-exploit
A Go-based Exploit Framework
☆315Updated this week
Alternatives and similar repositories for go-exploit:
Users that are interested in go-exploit are comparing it to the libraries listed below
- Golang weaponization for red teamers.☆485Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆575Updated 2 months ago
- Black box fuzzer for web applications☆419Updated 6 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆329Updated 2 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆251Updated 8 months ago
- A collection of offensive Go packages inspired by different Go repositories.☆232Updated 2 months ago
- A streamlined tool for discovering private TLDs for security research.☆172Updated this week
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆186Updated 2 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆350Updated 2 weeks ago
- Zero-dollar attack surface management tool☆268Updated 9 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆157Updated 2 months ago
- Find CVE PoCs on GitHub☆142Updated last year
- Session Hijacking Visual Exploitation☆196Updated 10 months ago
- Kubernetes exploitation tool☆361Updated 6 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆254Updated 7 months ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆503Updated 5 months ago
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆348Updated this week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆507Updated 3 weeks ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆330Updated last year
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆241Updated last year
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆412Updated this week
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆205Updated 2 months ago
- A source code static analysis platform for AppSec enthusiasts.☆231Updated last week
- ↕️🤫 Stealth redirector for your red team operation security☆650Updated 5 months ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆277Updated last year
- Discover new target domains using Content Security Policy☆391Updated this week
- Standalone utility for service discovery on open ports!☆593Updated 5 months ago
- Blazing fast, advanced Padding Oracle exploit☆241Updated 8 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆56Updated 8 months ago
- Nuclei templates for honeypots detection.☆196Updated last year