1
0
mirror of https://github.com/Binject/awesome-go-security.git synced 2024-11-28 08:58:44 +02:00

Add go-peer, Update Readme

This commit is contained in:
#571 2024-06-05 22:02:06 +07:00 committed by GitHub
parent abecc6823c
commit e8bb26493a
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

107
README.md
View File

@ -23,23 +23,24 @@ Pulled from collections such as [awesome-go](https://github.com/avelino/awesome-
* [simple-scrypt](https://github.com/elithrar/simple-scrypt) - Scrypt package with a simple, obvious API and automatic cost calibration built-in.
* [sio](https://github.com/minio/sio) - Go implementation of the Data At Rest Encryption ([DARE](https://blog.minio.io/data-at-rest-encryption-done-right-7446c644ddb6)) format.
* [hashid](https://github.com/JamesHovious/hashid) - Given a string determine the possible hashing algorithms used to produce that string.
* [crunchy](https://github.com/muesli/crunchy) - Finds common flaws in passwords. Like cracklib
* [crunchy](https://github.com/muesli/crunchy) - Finds common flaws in passwords. Like cracklib.
* [go-peer](https://github.com/number571/go-peer) - A software library for creating secure and anonymous decentralized systems.
## Packers / Obfuscators
* [Amber](https://github.com/EgeBalci/Amber) - Amber is a reflective PE packer for bypassing security products and mitigations.
* [gscript](https://github.com/gen0cide/gscript) - Framework to rapidly implement custom droppers for all three major operating systems
* [gobfuscate](https://github.com/unixpickle/gobfuscate) - Obfuscate Go binaries and packages
* [gscript](https://github.com/gen0cide/gscript) - Framework to rapidly implement custom droppers for all three major operating systems.
* [gobfuscate](https://github.com/unixpickle/gobfuscate) - Obfuscate Go binaries and packages.
* [goupx](https://github.com/pwaller/goupx) - Fix golang compiled binaries on x86_64 so that they can be packed with UPX.
* [stegify](https://github.com/DimitarPetrov/stegify) - Go tool for LSB steganography, capable of hiding any file within an image.
* [obfs4](https://github.com/Yawning/obfs4) - Yawning Angel courtesy mirror of the obfourscator
* [strobfus](https://github.com/znly/strobfus) - String obfuscation
* [obfs4](https://github.com/Yawning/obfs4) - Yawning Angel courtesy mirror of the obfourscator.
* [strobfus](https://github.com/znly/strobfus) - String obfuscation.
## Private Key Infrastructure
* [acmetool](https://github.com/hlandau/acme) - ACME (Let's Encrypt) client tool with automatic renewal.
* [certigo](https://github.com/square/certigo) - A utility to examine and validate certificates in a variety of formats
* [certigo](https://github.com/square/certigo) - A utility to examine and validate certificates in a variety of formats.
* [CloudFlare SSL](https://github.com/cloudflare/cfssl) - CFSSL is CloudFlare's PKI/TLS swiss army knife. It is both a command line tool and an HTTP API server for signing, verifying, and bundling TLS certificates.
@ -53,43 +54,43 @@ Pulled from collections such as [awesome-go](https://github.com/avelino/awesome-
* [dnd](https://github.com/0xcaff/dnd) - A web based drag and drop file transfer tool for sending files across the internet.
* [grab](https://github.com/cavaliercoder/grab) - Go package for managing file downloads.
* [onionbox](https://github.com/ciehanski/onionbox) - Send and recieve files through TOR
* [proxyd](https://github.com/hkparker/proxyd) - proxyd proxies data between TCP, TLS, and unix sockets
* [onionbox](https://github.com/ciehanski/onionbox) - Send and recieve files through TOR.
* [proxyd](https://github.com/hkparker/proxyd) - proxyd proxies data between TCP, TLS, and unix sockets.
## Recon
* [goca](https://github.com/gocaio/goca) - Goca Scanner https://goca.io
* [goca](https://github.com/gocaio/goca) - Goca Scanner https://goca.io.
## Phishing
* [evilginx2](https://github.com/kgretzky/evilginx2) - Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication.
* [gophish](https://github.com/gophish/gophish) - Open-Source Phishing Toolkit
* [gophish](https://github.com/gophish/gophish) - Open-Source Phishing Toolkit.
* [modlishka](https://github.com/drk1wi/Modlishka) - Modlishka. Reverse Proxy. Phishing NG.
* [phishery](https://github.com/ryhanson/phishery) - An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector
* [phishery](https://github.com/ryhanson/phishery) - An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector.
## Command and Control
* [chashell](https://github.com/sysdream/chashell) - Chashell is a Go reverse shell that communicates over DNS.
* [chisel](https://github.com/jpillora/chisel) - Chisel is a fast TCP tunnel, transported over HTTP, secured via SSH.
* [GoAT](https://github.com/petercunha/GoAT) - GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
* [GoAT](https://github.com/petercunha/GoAT) - GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server.
* [gobot2](https://github.com/SaturnsVoid/GoBot2) - Second Version of The GoBot Botnet, But more advanced.
* [goDoH](https://github.com/sensepost/goDoH) - A DNS-over-HTTPS Command & Control Proof of Concept.
* [goredshell](https://github.com/ahhh/goredshell) - A cross platform tool for verifying credentials and executing single commands
* [goredshell](https://github.com/ahhh/goredshell) - A cross platform tool for verifying credentials and executing single commands.
* [hershell](https://github.com/lesnuages/hershell) - Multiplatform reverse shell generator.
* [hideNsneak](https://github.com/rmikehodges/hideNsneak) - a CLI for ephemeral penetration testing
* [hideNsneak](https://github.com/rmikehodges/hideNsneak) - a CLI for ephemeral penetration testing.
* [keyserver](https://github.com/leoloobeek/keyserver) - Easily serve HTTP and DNS keys for proper payload protection.
* [liberetto](https://github.com/apcera/libretto) - Libretto is a Golang library to create Virtual Machines (VMs) on any cloud and Virtual Machine hosting platforms such as AWS, Azure, OpenStack, vSphere, or VirtualBox.
* [merlin](https://github.com/Ne0nd0g/merlin/) - Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
* [shellz](https://github.com/evilsocket/shellz) - shellz is a small utility to track and control your ssh, telnet, web and custom shells and tunnels.
* [squidshell](https://github.com/tomsteele/shellsquid) - A dynamic HTTP and DNS reverse proxy
* [squidshell](https://github.com/tomsteele/shellsquid) - A dynamic HTTP and DNS reverse proxy.
* [ratnet](https://github.com/awgh/ratnet) - Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.
* [Venom](https://github.com/Dliv3/Venom) - A Multi-hop Proxy for Penetration Testers Written in Go
* [holepunch-client](https://github.com/function61/holepunch-client) - Totally self-contained SSH reverse tunnel written in Go
* [Platypus](https://github.com/WangYihang/Platypus) - A modern multiple reverse shell sessions manager written in go
* [GoMet](https://github.com/mimah/GoMet) - Multi-platform backdoor in Go. TCP forwarding, socks5, tunneling, shell, download, exec
* [Venom](https://github.com/Dliv3/Venom) - A Multi-hop Proxy for Penetration Testers Written in Go.
* [holepunch-client](https://github.com/function61/holepunch-client) - Totally self-contained SSH reverse tunnel written in Go.
* [Platypus](https://github.com/WangYihang/Platypus) - A modern multiple reverse shell sessions manager written in go.
* [GoMet](https://github.com/mimah/GoMet) - Multi-platform backdoor in Go. TCP forwarding, socks5, tunneling, shell, download, exec.
## Web Framework Hardening
@ -97,14 +98,14 @@ Pulled from collections such as [awesome-go](https://github.com/avelino/awesome-
* [beego-security-headers](https://github.com/gosecguy/beego-security-headers) - Beego framework filter for easy security headers management.
* [badactor](https://github.com/jaredfolkins/badactor) - An in-memory application driven jailer written in Go.
* [goth](https://github.com/markbates/goth) - Provides a simple, clean, and idiomatic way to use OAuth and OAuth2. Handles multiple providers out of the box.
* [hsts](https://github.com/StalkR/hsts) - Go HTTP Strict Transport Security library
* [hsts](https://github.com/StalkR/hsts) - Go HTTP Strict Transport Security library.
* [httpauth](https://github.com/goji/httpauth) - HTTP Authentication middleware.
* [jwt](https://github.com/robbert229/jwt) - Clean and easy to use implementation of JSON Web Tokens (JWT).
* [jwt](https://github.com/pascaldekloe/jwt) - Lightweight JSON Web Token (JWT) library.
* [nosurf](https://github.com/justinas/nosurf) - CSRF protection middleware for Go.
* [oauth2](https://github.com/golang/oauth2) - Successor of goauth2. Generic OAuth 2.0 package that comes with JWT, Google APIs, Compute Engine and App Engine support.
* [osin](https://github.com/openshift/osin) - Golang OAuth2 server library.
* [paseto](https://github.com/o1egl/paseto) - Platform-Agnostic Security Tokens implementation in GO (Golang)
* [paseto](https://github.com/o1egl/paseto) - Platform-Agnostic Security Tokens implementation in GO (Golang).
* [gorilla/csrf](https://github.com/gorilla/csrf) - Provides Cross-Site Request Forgery (CSRF) prevention middleware for Go web applications & services.
* [gorilla/securecookie](https://github.com/gorilla/securecookie) - Encodes and decodes authenticated and optionally encrypted cookie values for Go web applications.
* [secure](https://github.com/unrolled/secure) - Secure is an HTTP middleware for Go that facilitates most of your security needs for web applications.
@ -114,24 +115,24 @@ Pulled from collections such as [awesome-go](https://github.com/avelino/awesome-
* [gobuster](https://github.com/OJ/gobuster) - Directory/file & DNS busting tool written in Go.
* [gofuzz](https://github.com/braaaax/gofuzz) - Aims to reproduce wfuzz's functionality and versatility. Based on gobuster.
* [recursebuster](https://github.com/C-Sto/recursebuster) - Rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments
* [recursebuster](https://github.com/C-Sto/recursebuster) - Rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments.
* [url2img](https://github.com/gen2brain/url2img) - HTTP server with API for capturing screenshots of websites.
* [madns](https://github.com/awgh/madns) - DNS server for pentesters.
* [rescope](https://github.com/root4loot/rescope) - Parse scope definitions to Burp Suite / ZAP compatible formats for import
* [rescope](https://github.com/root4loot/rescope) - Parse scope definitions to Burp Suite / ZAP compatible formats for import.
* [Wuzz](https://github.com/asciimoo/wuzz) - Interactive cli tool for HTTP inspection.
## Network Scanners
* [amass](https://github.com/OWASP/Amass) - In-depth DNS Enumeration and Network Mapping
* [amass](https://github.com/OWASP/Amass) - In-depth DNS Enumeration and Network Mapping.
* [bettercap](https://github.com/bettercap/bettercap) - The Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
* [furious](https://github.com/liamg/furious) - Golang IP/port scanner with SYN (stealth) scanning and device manufacturer identification
* [goddi](https://github.com/NetSPI/goddi) - goddi (go dump domain info) dumps Active Directory domain information
* [furious](https://github.com/liamg/furious) - Golang IP/port scanner with SYN (stealth) scanning and device manufacturer identification.
* [goddi](https://github.com/NetSPI/goddi) - goddi (go dump domain info) dumps Active Directory domain information.
* [nextnet](https://github.com/hdm/nextnet) - nextnet is a pivot point discovery tool written in Go.
* [vulns](https://github.com/future-architect/vuls) - Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
* [vulns](https://github.com/future-architect/vuls) - Vulnerability scanner for Linux/FreeBSD, agentless, written in Go.
* [xray](https://github.com/evilsocket/xray) - XRay is a tool for recon, mapping and OSINT gathering from public networks.
* [subjack](https://github.com/haccer/subjack) - Subdomain Takeover tool written in Go
* [flightsim](https://github.com/alphasoc/flightsim) - A utility to generate malicious network traffic and evaluate controls
* [Cameradar](https://github.com/Ullaakut/cameradar) - An scanner with RTSP stream access tool that comes with its library
* [subjack](https://github.com/haccer/subjack) - Subdomain Takeover tool written in Go.
* [flightsim](https://github.com/alphasoc/flightsim) - A utility to generate malicious network traffic and evaluate controls.
* [Cameradar](https://github.com/Ullaakut/cameradar) - An scanner with RTSP stream access tool that comes with its library.
## Network Analysis
@ -139,25 +140,25 @@ Pulled from collections such as [awesome-go](https://github.com/avelino/awesome-
* [goshark](https://github.com/sunwxg/goshark) - Package goshark use tshark to decode IP packet and create data struct to analyse packet.
* [gosnmp](https://github.com/soniah/gosnmp) - Native Go library for performing SNMP actions.
* [gopassivedns](https://github.com/Phillipmartin/gopassivedns) - PassiveDNS in Go.
* [nfp](https://github.com/awgh/nfp) - Network Finger Printer
* [nfp](https://github.com/awgh/nfp) - Network Finger Printer.
## Exploit Development
* [binjection](https://github.com/Binject/binjection) - Injects additional machine instructions into various binary formats.
* [pwn](https://github.com/UlisseMini/pwn) - Pwntools for go!
* [monkey](https://github.com/bouk/monkey) - Monkey patching in Go
* [usercorn](https://github.com/lunixbochs/usercorn) - Dynamic binary analysis via platform emulation
* [monkey](https://github.com/bouk/monkey) - Monkey patching in Go.
* [usercorn](https://github.com/lunixbochs/usercorn) - Dynamic binary analysis via platform emulation.
## Detection Engines
* [fleet](https://github.com/kolide/fleet) - A flexible control server for osquery [fleets](https://kolide.com/fleet)
* [fleet](https://github.com/kolide/fleet) - A flexible control server for osquery [fleets](https://kolide.com/fleet).
* [go-yara](https://github.com/hillu/go-yara) - Go Bindings for [YARA](https://github.com/plusvic/yara), the "pattern matching swiss knife for malware researchers (and everyone else)".
* [honeytrap](https://github.com/honeytrap/honeytrap) - Advanced Honeypot framework.
* [malace](https://github.com/maliceio/malice) - VirusTotal Wanna Be - Now with 100% more Hipster
* [sgt](https://github.com/OktaSecurityLabs/sgt) - Osquery Mangement Server
* [osquery-go](https://github.com/kolide/osquery-go) - Go bindings for osquery
* [malace](https://github.com/maliceio/malice) - VirusTotal Wanna Be - Now with 100% more Hipster.
* [sgt](https://github.com/OktaSecurityLabs/sgt) - Osquery Mangement Server.
* [osquery-go](https://github.com/kolide/osquery-go) - Go bindings for osquery.
## Chat Bots
@ -166,43 +167,43 @@ Pulled from collections such as [awesome-go](https://github.com/avelino/awesome-
* [alfred](https://github.com/demisto/alfred) - A Slack bot to add security info to messages containing URLs, hashes and IPs.
* [go-chat-bot](https://github.com/go-chat-bot/bot) - IRC, Slack & Telegram bot written in Go.
* [flottbot](https://github.com/target/flottbot) - A chatbot framework written in Go. All configurations are made in YAML.
* [gohubsbot](https://gitlab.com/rek2/gohubsbot) - A minimal bridge bot between Mozilla Hubs and the Matrix chat protocol
* [gohubsbot](https://gitlab.com/rek2/gohubsbot) - A minimal bridge bot between Mozilla Hubs and the Matrix chat protocol.
## System Information
* [goinfo](https://github.com/matishsiao/goInfo) - get os information use golang
* [gopsutil](https://github.com/shirou/gopsutil) - psutil for golang
* [goinfo](https://github.com/matishsiao/goInfo) - get os information use golang.
* [gopsutil](https://github.com/shirou/gopsutil) - psutil for golang.
## General Post Exploitation
* [dlgs](https://github.com/gen2brain/dlgs) - Go cross-platform library for displaying dialogs and input boxes
* [dlgs](https://github.com/gen2brain/dlgs) - Go cross-platform library for displaying dialogs and input boxes.
* [goreddeath](https://github.com/ahhh/GoRedDeath) - Experimenting with destructive file attacks in Go.
* [goredloot](https://github.com/ahhh/GoRedLoot) - A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.
* [goredspy](https://github.com/ahhh/GoRedSpy) - Post exploitation desktop screensho / user monitoring tool
* [goredspy](https://github.com/ahhh/GoRedSpy) - Post exploitation desktop screensho / user monitoring tool.
* [PandorasBox](https://github.com/Adversis/PandorasBox) - Security tool to quickly audit Public Box files and folders.
## Windows Specific
* [amsi](https://github.com/garethjensen/amsi) - Golang implementation of Microsoft Antimalware Scan Interface
* [amsi](https://github.com/garethjensen/amsi) - Golang implementation of Microsoft Antimalware Scan Interface.
* [go-acl](https://github.com/hectane/go-acl) - Go library for manipulating ACLs on Windows.
* [go-execute-assembly](https://github.com/lesnuages/go-execute-assembly) - Allow a Go process to dynamically load .NET assemblies.
* [go-ole](https://github.com/go-ole/go-ole) - Go bindings for Windows COM using shared libraries instead of cgo.
* [gosecretsdump](https://github.com/C-Sto/gosecretsdump) - Fast hash dumper for NTDS.dit files
* [gosecretsdump](https://github.com/C-Sto/gosecretsdump) - Fast hash dumper for NTDS.dit files.
* [go-winio](https://github.com/Microsoft/go-winio) - This repository contains utilities for efficiently performing Win32 IO operations in Go.
* [ldap](https://github.com/go-ldap/ldap) - Basic LDAP v3 functionality for the GO programming language.
* [winrm](https://github.com/masterzen/winrm) - Command-line tool and library for Windows remote command execution in Go.
* [wmi](https://github.com/StackExchange/wmi) - Package wmi provides a WQL interface to Windows WMI.
* [taskmaster](https://github.com/capnspacehook/taskmaster) - Windows Task Scheduler Library for Go.
* [gordp](https://github.com/Madnikulin50/gordp) - Rdp client on pure GoLang
* [w32](https://github.com/JamesHovious/w32) - A wrapper of Windows APIs for Go
* [gordp](https://github.com/Madnikulin50/gordp) - Rdp client on pure GoLang.
* [w32](https://github.com/JamesHovious/w32) - A wrapper of Windows APIs for Go.
* [goWMIExec](https://github.com/C-Sto/goWMIExec) - Pash the Hash, execute a command on a target machine using WMI by providing an NTLM hash for the specified user.
## MacOS Specific
* [damage](https://github.com/itchio/damage) - A toolkit for creating and manipulating DMGs
* [racoon](https://github.com/groob/racoon) - loop through a munki manifest and install everything
* [damage](https://github.com/itchio/damage) - A toolkit for creating and manipulating DMGs.
* [racoon](https://github.com/groob/racoon) - loop through a munki manifest and install everything.
## Linux Specific
@ -219,20 +220,20 @@ Pulled from collections such as [awesome-go](https://github.com/avelino/awesome-
## Data Parsing
* [cacador](https://github.com/sroberts/cacador) - Indicator extractor of IOCs
* [cacador](https://github.com/sroberts/cacador) - Indicator extractor of IOCs.
## Static Code Analysis
* [go-callvis](https://github.com/TrueFurby/go-callvis) - go-callvis is a development tool to help visualize call graph of a Go program using interactive view.
* [go-diff](https://github.com/sergi/go-diff) - Diff, match and patch text in Go
* [go-diff](https://github.com/sergi/go-diff) - Diff, match and patch text in Go.
* [gosec](https://github.com/securego/gosec) - Inspects source code for security problems by scanning the Go AST.
* [gometalinter](https://github.com/alecthomas/gometalinter) - Concurrently run Go lint tools and normalise their output.
## Assembly
* [avo](https://github.com/mmcloughlin/avo) - Generate x86 Assembly with Go
* [c2goasm](https://github.com/minio/c2goasm) - C to Go Assembly
* [shellcode](https://github.com/Binject/shellcode) - Shellcode library as a Go package
* [avo](https://github.com/mmcloughlin/avo) - Generate x86 Assembly with Go.
* [c2goasm](https://github.com/minio/c2goasm) - C to Go Assembly.
* [shellcode](https://github.com/Binject/shellcode) - Shellcode library as a Go package.