whid-injector / awesome-GO-offensive-tools
List of Awesome Offensive Tools written in GO
☆200Updated 6 years ago
Alternatives and similar repositories for awesome-GO-offensive-tools:
Users that are interested in awesome-GO-offensive-tools are comparing it to the libraries listed below
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆287Updated 4 months ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 4 years ago
- Collection of social engineering payloads☆296Updated 7 years ago
- VPN pentest tools and scripts☆121Updated 7 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆205Updated 6 years ago
- ☆220Updated 9 months ago
- Linux Privilege Escalation Tool☆184Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- For all your network pentesting needs☆152Updated 8 months ago
- Pentesting suite for Maltego based on data in a Metasploit database☆145Updated 6 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆161Updated 5 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆178Updated 4 years ago
- 🔺 Red Team Hardware Toolkit 🔺☆322Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.☆184Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- Rapid Attack Infrastructure (RAI)☆302Updated 3 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆143Updated 2 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆178Updated 6 years ago
- Pentest dropbox setup scripts for Kali Linux☆88Updated 9 years ago
- penetration testing scripts☆136Updated 5 years ago
- Network Pivoting Toolkit☆440Updated last year
- An advanced graphical search engine for Exploit-DB☆117Updated 9 months ago