whid-injector / awesome-GO-offensive-toolsLinks
List of Awesome Offensive Tools written in GO
☆202Updated 6 years ago
Alternatives and similar repositories for awesome-GO-offensive-tools
Users that are interested in awesome-GO-offensive-tools are comparing it to the libraries listed below
Sorting:
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 5 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆205Updated 6 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆293Updated 7 months ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Collection of social engineering payloads☆296Updated 7 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- WIreless Hacking Tools☆165Updated 11 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- Tool made to automate tasks of pentesting.☆166Updated 5 years ago
- For all your network pentesting needs☆154Updated 11 months ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆395Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- ☆224Updated last year
- Pivoting Frontend for Pre-Seeded Password Databases☆131Updated this week
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆183Updated 4 years ago
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆146Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- Network Pivoting Toolkit☆448Updated last year
- Intelligence and Reconnaissance Package/Bundle installer.☆239Updated 4 years ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆209Updated 7 years ago
- locate and attack Lync/Skype for Business☆338Updated 8 months ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago