vulncheck-oss / go-exploit
A Go-based Exploit Framework
☆322Updated this week
Alternatives and similar repositories for go-exploit:
Users that are interested in go-exploit are comparing it to the libraries listed below
- Golang weaponization for red teamers.☆489Updated last year
- A collection of offensive Go packages inspired by different Go repositories.☆236Updated 4 months ago
- Black box fuzzer for web applications☆423Updated 8 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆594Updated 3 months ago
- Find CVE PoCs on GitHub☆143Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆256Updated 8 months ago
- Kubernetes exploitation tool☆362Updated 7 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆335Updated 3 months ago
- A source code static analysis platform for AppSec enthusiasts.☆234Updated last week
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆429Updated last year
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆347Updated this week
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆530Updated 3 weeks ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆217Updated 3 weeks ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆542Updated last week
- Standalone utility for service discovery on open ports!☆596Updated 6 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆253Updated 9 months ago
- Zero-dollar attack surface management tool☆273Updated 10 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆663Updated 6 months ago
- Blazing fast, advanced Padding Oracle exploit☆247Updated 9 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆57Updated 10 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆243Updated last year
- Session Hijacking Visual Exploitation☆196Updated 11 months ago
- Hourly updated database of exploit and exploitation reports☆254Updated last month
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆218Updated 3 months ago
- Discover new target domains using Content Security Policy☆396Updated last week
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆280Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆156Updated 3 months ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆401Updated last month
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆350Updated last month
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆330Updated last year