Golang

Explore 34 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
haktrails Logo

Golang client for querying SecurityTrails API data

0
urlgrab Logo

A golang utility to spider through a website searching for additional links.

0
Gospider Logo

A Go-based web spider tool for automated crawling and data collection from web resources across multiple protocols and formats.

0
Andor Logo

A blind SQL injection tool written in Golang

0
gowitness Logo

A Go-based command-line tool that uses Chrome Headless to automatically capture screenshots of web pages for reconnaissance and analysis purposes.

0
Naabu Logo

A fast and reliable port scanner written in Go, designed for attack surface discovery in bug bounties and penetration testing.

0
crawley Logo

A Go-based web crawler that supports multiple protocols and authentication methods for systematic web resource discovery and collection.

0
Retraced Logo

Retraced is an audit logging solution that provides compliant, searchable audit trails for applications with client libraries for Go and JavaScript.

0
honeydet Logo

A signature-based, multi-threaded honeypot detection tool written in Golang that identifies honeypots through crafted requests and response analysis.

1
Stratus Red Team Logo

A cloud-focused attack simulation framework that provides granular, self-contained offensive techniques mapped to MITRE ATT&CK for red team exercises.

0
Crashwalk Logo

A Go-based crash analysis tool that processes and reproduces crash files from fuzzing tools like AFL with multiple debugging engines and output formats.

0
IMAP-Honey Logo

IMAP-Honey is a honeypot tool for IMAP and SMTP protocols with support for logging to console or syslog.

0
Conmachi Container Scanner Logo

A Golang-based container security scanner that identifies potential vulnerabilities and misconfigurations in container environments by checking namespacing, capabilities, security profiles, and host device mounts.

0
Preflight Logo

Preflight is a Go-based verification tool that helps organizations validate scripts and executables to prevent supply chain attacks by enabling secure self-compilation and trusted distribution methods.

0
Merlin Logo

A cross-platform HTTP/2 Command & Control framework written in Golang for post-exploitation activities and remote system management.

0
gVisor Logo

gVisor is a Go-based application kernel that provides enhanced container isolation by implementing Linux system calls and limiting host kernel exposure through its runsc OCI runtime.

0
AMT Honeypot Logo

A Go-based honeypot that mimics Intel's AMT management service to detect and log exploitation attempts targeting the CVE-2017-5689 firmware vulnerability.

0
Haaukins Logo

Haaukins is an automated virtualization platform that provides hands-on cybersecurity education through capture the flag exercises in controlled vulnerable environments.

0
Respounder Logo

A cross-platform network detection tool that identifies active Responder tools by sending LLMNR queries for fabricated hostnames.

0
Cert Spotter Logo

A Certificate Transparency log monitor that alerts users when SSL/TLS certificates are issued for their domains, helping detect unauthorized certificate issuance and potential security threats.

0
go-pillage-registries Logo

A command-line tool that extracts manifest and configuration data from Docker registry images for security analysis and reconnaissance purposes.

0
Syrup Logo

Syrup is a Go-based SSH honeypot that simulates SSH services with fake shells, session recording, and comprehensive logging to monitor and analyze unauthorized access attempts.

0
RedisHoneyPot Logo

A high-interaction honeypot system supporting the Redis protocol.

0
Kubesploit Logo

A cross-platform post-exploitation HTTP/2 Command & Control framework designed specifically for testing and exploiting containerized environments including Docker and Kubernetes.

0