go-exploit icon indicating copy to clipboard operation
go-exploit copied to clipboard

A Go-based Exploit Framework

Results 55 go-exploit issues
Sort by recently updated
recently updated
newest added

Closes #234 Allows for protocols to have explicit flags that will resolve when they get defined. For example, if your exploit defines "HTTP" as it's protocol, this change automatically applies...

enhancement
rfc

Part of #189 This is the first pass at adding a basic artifact storage to the framework. Changes are: - Add a SQL table for a really basic artifact set...

documentation
enhancement
rfc

Automated changes by [create-pull-request](https://github.com/peter-evans/create-pull-request) GitHub action

Adds a set off helper functions to help chain ASP.NET application state management functions. Historically, ASP.NET apps have been a bit of a nuisance to work with because of the...

enhancement

This adds support for adding explicit payload support to an exploit. This provides a few things: - *Bring Your Own Payload* (BYOP). Long awaited ability to support user provided payloads....

enhancement
proposal
go

Requires https://github.com/vulncheck-oss/go-exploit/pull/377 The goal is to put helper functions/wrappers in this package to reduce boilerplate and increase consistency. Also helps to prevent import cycle issues. Usage examples: ## Simple Version...

enhancement

As discussed on our call, add a new payload "type" option that allows for the exploit author to specify what type of payload is supported by the exploit. This will...

rfc

This proposal is to replace the very large (and growing) pile of options for `protocol` with a [functional options](https://github.com/teivah/100-go-mistakes/blob/master/src/02-code-project-organization/11-functional-options/functional-options/main.go) pattern. I also propose that we adopt either the functional options...

rfc
api-break

Details: https://github.com/vulncheck-oss/go-exploit/pull/410#discussion_r2220000706

To prevent things like this: ``` time=2025-07-17T12:58:40.855-06:00 level=SUCCESS msg="The target appears to be a vulnerable version!" host=192.168.23.48 port=443 vulnerable=yes time=2025-07-17T12:58:40.855-06:00 level=STATUS msg="Running command/args: 'cmd' - '/c certutil.exe -urlcache -split -f...