go-emulators Logo

go-emulators

A set of Go-based emulators for testing network security and analyzing network traffic.

10
Visit website
Claim and verify your listing
0

go-emulators Description

Due to a honeypot user mentioning that the C code was potentially vulnerable we have rewritten the emulated services in GO. We have seen a drastic performance increase. This tool is a set of emulators written in Go that mimic common network services, allowing you to test and analyze network traffic. It includes emulators for HTTP, FTP, SSH, and more. This tool is useful for testing network security, identifying vulnerabilities, and analyzing network traffic.

go-emulators FAQ

Common questions about go-emulators including features, pricing, alternatives, and user reviews.

go-emulators is A set of Go-based emulators for testing network security and analyzing network traffic.. It is a Security Operations solution designed to help security teams with Go, Network Testing, Network Security.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

8
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

6
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
Guide to Ethical Hacking Logo

A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

5
View Popular Tools →

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox