Loading...
Browse 29 go tools
A reverse engineering framework with a focus on usability and code cleanliness
A Go-based web spider tool for automated crawling and data collection from web resources across multiple protocols and formats.
A Go-based web crawler that supports multiple protocols and authentication methods for systematic web resource discovery and collection.
A cloud-focused attack simulation framework that provides granular, self-contained offensive techniques mapped to MITRE ATT&CK for red team exercises.
A Go-based crash analysis tool that processes and reproduces crash files from fuzzing tools like AFL with multiple debugging engines and output formats.
Preflight is a Go-based verification tool that helps organizations validate scripts and executables to prevent supply chain attacks by enabling secure self-compilation and trusted distribution methods.
A set of Go-based emulators for testing network security and analyzing network traffic.
A Go-based honeypot that mimics Intel's AMT management service to detect and log exploitation attempts targeting the CVE-2017-5689 firmware vulnerability.
A honeypot installation for Drupal that supports Go modules and mimics different versions of Drupal.
An alternative to the auditd daemon with goals of safety, speed, JSON output, and pluggable pipelines connecting to the Linux kernel via netlink.
Automatically curate open-source Yara rules and run scans with YAYA.
A honeypot tool emulating HL7 / FHIR protocols with various installation and customization options.
Low-interaction VNC honeypot for logging responses to a static VNC Auth challenge.
Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.
Web application for visualizing live GPS locations on an SVG world map using honeypot captures.
A low-interaction SSH honeypot tool for recording authentication attempts.
Cross-platform HTTP honeypot that traps bots with infinite data streams
A command-line tool for searching AWS CloudWatch logs using pattern matching with configurable parameters for log groups, time ranges, and regions.
Get strategic cybersecurity insights in your inbox