List of Awesome Offensive Tools written in GO
☆205Feb 25, 2019Updated 7 years ago
Alternatives and similar repositories for awesome-GO-offensive-tools
Users that are interested in awesome-GO-offensive-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android Mobile App for Controlling WHID Injector remotely.☆213Jan 7, 2023Updated 3 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆1,793Jul 27, 2024Updated last year
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆265Sep 22, 2023Updated 2 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆20May 2, 2017Updated 8 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Official Black Hat Arsenal Security Tools Repository☆14Dec 7, 2017Updated 8 years ago
- Abusing Exchange via EWS☆153Sep 14, 2020Updated 5 years ago
- Tool for password spraying RDP☆98Oct 12, 2018Updated 7 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- nextnet is a pivot point discovery tool written in Go.☆453Aug 4, 2025Updated 8 months ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 5 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆471Nov 14, 2019Updated 6 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Shellcoding utilities☆225Dec 16, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ESP8266 ROM Bootloader utility☆12Jun 28, 2020Updated 5 years ago
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- ntlm relay attack to Exchange Web Services☆333Jan 15, 2018Updated 8 years ago
- Malicious Macro Generator☆831Apr 17, 2019Updated 7 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,615Dec 10, 2018Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 3 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆730Jan 21, 2020Updated 6 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Jul 16, 2023Updated 2 years ago
- Office365 Tenants List☆16Jun 12, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Active Directory ACL exploitation with BloodHound☆760Nov 18, 2021Updated 4 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- ☆298Nov 9, 2020Updated 5 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆702Jul 27, 2020Updated 5 years ago
- ☆39Oct 8, 2019Updated 6 years ago