I used examples from the books "Violent Python" TJ O'Connor, "Black Hat Python" Python Programming for Hackers and Pentesters by Justin Seitz, "Security with Go" by John Daniel Leon and asecuritysite
examples from the book "Black Hat Go" Go Programming For Hackers and Pentesters by Tom Steele, Chris Patten, and Dan Kottmann
Thanks to all authors of amazing books on information security
Use dep
sudo apt-get install libpcap-dev
This project is licensed under MIT license. Please read the LICENSE file.
In spite of the license, I PREDICT that all the examples here are for reference only, and not for criminal (or malicious) purposes.
Welcomes any kind of contribution. Please read the CONTRIBUTING, ISSUE TEMPLATE and CODE_OF_CONDUCT file.