Cybersecurity toolkit for Gophers
For educational purposes, work in progress....
v0.0.0
- Default port scanner
- HTTP flood attack
- Sample HTTP user agents
- PNG LSB Steganography (https://github.com/auyer/steganography)
- UTF-8 Steganography (with zero-width characters)
- Write our own implementation of PNG LSB steganographer
v0.1.0
- SSH remote shell execution
- TCP SYN port scanner (https://github.com/google/gopacket/blob/master/examples/synscan/main.go)
- Slow loris attack
- TCP SYN flood attack
- UDP flood attack
- NTP amplification attack
- DNS cache poisoning
- File encryption (fsutil)
- Binary injection (fsutil)
- Remote shell execution (netutil)
- DNS amplification attack (https://github.com/say4n/dns.amplify)
- Password cracking (dictionary, timing and brute force attacks)
- Packet capture (https://github.com/google/gopacket/blob/master/examples/pcapdump/main.go)
- Packet replay (https://github.com/google/gopacket/blob/master/examples/pcaplay/main.go)
- Packet crafting (Packet crafting - spoof IP and mac addresses, craft fake packets)
- Make a CLI utility to quickly use the library from the terminal
v0.2.0
- Botnet framework