vulncheck-oss / go-exploitLinks
A Go-based Exploit Framework
☆404Updated last week
Alternatives and similar repositories for go-exploit
Users that are interested in go-exploit are comparing it to the libraries listed below
Sorting:
- Golang weaponization for red teamers.☆514Updated 2 years ago
- Zero-dollar attack surface management tool☆313Updated last year
- Kubernetes exploitation tool☆364Updated last year
- reverse shell using curl☆476Updated last year
- A source code static analysis platform for AppSec enthusiasts.☆267Updated last month
- A collection of offensive Go packages inspired by different Go repositories.☆253Updated last year
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆640Updated 9 months ago
- ☆612Updated 3 weeks ago
- Blazing fast, advanced Padding Oracle exploit☆263Updated last month
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆416Updated 8 months ago
- Black box fuzzer for web applications☆437Updated 6 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆311Updated last year
- Session Hijacking Visual Exploitation☆210Updated last year
- A library for detecting known secrets across many web frameworks☆762Updated 2 weeks ago
- Standalone utility for service discovery on open ports!☆677Updated 2 weeks ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆282Updated 4 months ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆406Updated last year
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆474Updated 2 years ago
- Go alternative of python SimpleHTTPServer☆528Updated this week
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆400Updated last month
- Hourly updated database of exploit and exploitation reports☆259Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆713Updated 2 weeks ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆281Updated 10 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆355Updated 2 years ago
- Find CVE PoCs on GitHub☆158Updated 5 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,060Updated 6 months ago
- Fast and lightweight, UDPX is a single-packet UDP scanner written in Go that supports the discovery of over 45 services with the ability …☆215Updated 2 years ago
- ☆153Updated last month
- Tool for searching Exploits from Exploit Databases, etc.☆294Updated last month
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆422Updated this week