Security

Libraries that are used to help make your application more secure.

Newest releases
1.8k

liamg It'll exploit most sudo privileges listed in GTFOBins to pop a root shell, as well as exploiting issues like a writable docker.sock. More routes to root will be added over time too.
 

codenoid Someone tried to unlock your device
 
742

aquasecurity Tracee is a Runtime Security and forensics tool for Linux. It is using Linux eBPF technology to trace your system and applications at runtime, and analyze collected events to detect suspicious behavioral patterns.
 
690

deepfence Find secrets and passwords in container images and file systems
 

owenrumney What the world needed, another leak scanner
 

visma-prodsec A tool for checking for lingering free namespaces for private package names referenced in dependency configuration for Python (pypi) requirements.txt or JavaScript (npm) package.json
 
409

saferwall Saferwall is an open source malware analysis platform.
 
5.4k

gophish Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training.
 

breml Package rootcerts provides an embedded copy of the Mozilla Included CA Certificate List, more specifically the PEM of Root Certificates in Mozilla's Root Store with the Websites (TLS/SSL) Trust Bit Enabled. If this package is impo
 
689

kitabisa Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server
 

blackcrw Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.
 

elastic Secret management toolchain
 
1.9k

prysmaticlabs This is the core repository for Prysm, a Golang implementation of the Ethereum 2.0 specification, developed by Prysmatic Labs.
 
1.8k

thrasher-corp A cryptocurrency trading bot and framework supporting multiple exchanges written in Golang.
 
515

ossf OSS Security Scorecards
 
2.5k

moonD4rk Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。
 
3.6k

tailscale The easiest, most secure way to use WireGuard and 2FA.
 
1.1k

parsiya Golang for Security Professionals
 

Shivangx01b A fuzzer made in golang for finding issues like xss, lfi, rce, ssti...that detects issues using change in content length and verify it using signatures.
 

kataras Fast and simple JWT implementation written in Go.
 

lane-c-wagner No-bullshit password validator using raw entropy values. Hit the project with a star if you find it useful ⭐
 

c9s A trading bot framework written in Go. The name bbgo comes from the BB8 bot in the Star Wars movie. aka Buy BitCoin Go!
 

timwhitez Cobalt Strike Shellcode Loader by Golang
 

zznop Sploit is a Go package that aids in binary analysis and exploitation. The motivating factor behind the development of sploit is to be able to have a well designed API with functionality that rivals some of the more common Python e
 

evilsocket Takuan is a system service that parses logs and dectects noisy attackers in order to build a blacklist database of known cyber offenders.
 

jmhodges kustomize-age is a plugin for kustomize that allows the user to keep local files encrypted with age that are decrypted before being used as files inside a kubernetes Secret.
 

wengerwu With the concept of Block-chain s a Service, BFBaas Platform provides block chain serives to clients, assits industries to set business on block chain, and excavates commercial values of block chain.
 
1.1k

hahwul ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
 

dwisiswant0 CRLFuzz - a fast tool to scan CRLF vulnerability written in Go
 
316

SixGenInc Cloudflare is now refusing any ClientHello with an ESNI and an SNI, effectively breaking Noctilucent's firewall bypass ability. You can still "hide" a connection by using any Cloudflare DNS hosted domain to connect to while sendin
 

muesli sasquatch - A simple data encryption library
 
188

DeimosC2 DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that have been compromised.
 
152

elcuervo Tangalanga: the Zoom conference scanner hacking tool