vulncheck-oss / go-exploitLinks
A Go-based Exploit Framework
☆351Updated this week
Alternatives and similar repositories for go-exploit
Users that are interested in go-exploit are comparing it to the libraries listed below
Sorting:
- Golang weaponization for red teamers.☆500Updated last year
- A collection of offensive Go packages inspired by different Go repositories.☆245Updated 9 months ago
- Zero-dollar attack surface management tool☆295Updated last year
- A source code static analysis platform for AppSec enthusiasts.☆255Updated 5 months ago
- Kubernetes exploitation tool☆362Updated last year
- reverse shell using curl☆459Updated last year
- Blazing fast, advanced Padding Oracle exploit☆254Updated last year
- Hourly updated database of exploit and exploitation reports☆258Updated 6 months ago
- ☆526Updated this week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆272Updated 4 months ago
- Find CVE PoCs on GitHub☆148Updated last week
- Black box fuzzer for web applications☆428Updated 2 weeks ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆401Updated 6 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆366Updated 3 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆376Updated 2 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆303Updated last year
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆575Updated 3 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆679Updated 5 months ago
- Go alternative of python SimpleHTTPServer☆518Updated last year
- Tool for searching Exploits from Exploit Databases, etc.☆287Updated 3 weeks ago
- Session Hijacking Visual Exploitation☆202Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆231Updated 6 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆677Updated 3 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆316Updated 8 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆344Updated last year
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆398Updated this week
- ☆237Updated last year
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆450Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆700Updated last month
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆271Updated 5 months ago