A Go-based Exploit Framework
☆413Mar 6, 2026Updated this week
Alternatives and similar repositories for go-exploit
Users that are interested in go-exploit are comparing it to the libraries listed below
Sorting:
- Golang weaponization for red teamers.☆516Jan 17, 2024Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆61Feb 14, 2025Updated last year
- Standalone utility for service discovery on open ports!☆733Jan 13, 2026Updated last month
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆386Jul 30, 2024Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,773May 22, 2024Updated last year
- Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.☆603Updated this week
- An offensive data enrichment pipeline☆924Mar 3, 2026Updated last week
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆721Feb 28, 2026Updated last week
- mTLS-Encrypted Back-Connect SOCKS5 Proxy☆481Sep 19, 2023Updated 2 years ago
- The Havoc Framework☆8,203Dec 18, 2025Updated 2 months ago
- reverse shell using curl☆478Apr 20, 2024Updated last year
- nysm is a stealth post-exploitation container.☆267Jun 19, 2025Updated 8 months ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,067Mar 1, 2026Updated last week
- Real fucking shellcode encryptor & obfuscator tool☆1,012Jan 7, 2026Updated 2 months ago
- ☆189Nov 21, 2024Updated last year
- Adversary Emulation Framework☆10,798Updated this week
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆360Dec 13, 2025Updated 2 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆66Nov 20, 2025Updated 3 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆43Jan 14, 2026Updated last month
- dump Chrome cookies remotely with atexec and CDP☆69Aug 10, 2024Updated last year
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated last week
- Recon scripts for Red Team and Web blackbox auditing☆25Updated this week
- ☆520Apr 29, 2024Updated last year
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆406Sep 12, 2023Updated 2 years ago
- Repository to store exploits created by Assetnotes Security Research team☆181Nov 7, 2023Updated 2 years ago
- A robust Red Team proxy written in Go.☆164Dec 26, 2021Updated 4 years ago
- ☆67Oct 10, 2023Updated 2 years ago
- Kubernetes exploitation tool☆362Feb 25, 2026Updated last week
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆288May 16, 2025Updated 9 months ago
- The Distributed Scanning Framework for Everybody! Control Your Infrastructure, Scale Your Scanning-On Your Terms. Easily distribute arbit…☆724Dec 26, 2025Updated 2 months ago
- ☆716Mar 22, 2024Updated last year
- Because AV evasion should be easy.☆859Nov 28, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- Tool to remotely dump secrets from the Windows registry☆522Feb 27, 2026Updated last week
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆839Dec 2, 2023Updated 2 years ago
- 🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific…☆660Apr 27, 2025Updated 10 months ago