go-exploit
go-exploit copied to clipboard
A Go-based Exploit Framework
# Problem Currently the `go-exploit/payload` package is used as a generic store for all payload related activities including: - Bind shells - Reverse shells - Payload encoding - "Minified" &...
This currently looks wacky. It's meant to return true if it's `ok` but receiving variables seem to be `err` which is obviously confusing. https://github.com/vulncheck-oss/go-exploit/blob/c3034af6e09ebf3ce7d442e19654f92081969509/protocol/httphelper.go#L226
This adds the NodeJS, Perl, Ruby, ksh, and socat payloads from the gtfobins project (with some modification). It's also the first steps to starting to figure out how to best...
Automated changes by [create-pull-request](https://github.com/peter-evans/create-pull-request) GitHub action
Currently, the database implementation creates two tables: one for HTTP caching and one for results of verify target. There should be a third table for the results of check version....
It's come up a few times in the last few weeks where we have added flags for doing virtualhost settings in `protocol` or want to allow for changing of the...
We are now at the point that simple reverse shells are not cutting all the use cases. This lays the framework to move to a channel object containing data that...