All Projects → TralahM → Blackhat Go

TralahM / Blackhat Go

Licence: gpl-3.0
As hackers, we put a premium on function over elegance as time is always scarce. When you need to quickly create a solution to a problem, style concerns come secondary.

Programming Languages

go
31211 projects - #10 most used programming language
golang
3204 projects

Projects that are alternatives of or similar to Blackhat Go

Chat Socket
A simple chat room using java socket with the client-server paradigm
Stars: ✭ 24 (-76.24%)
Mutual labels:  tcp-server
Block Ads Via Dns
Block ads and malware via local DNS server
Stars: ✭ 50 (-50.5%)
Mutual labels:  dns-server
Fixio
FIX Protocol Support for Netty
Stars: ✭ 84 (-16.83%)
Mutual labels:  tcp-server
Pi Hole
A black hole for Internet advertisements
Stars: ✭ 34,076 (+33638.61%)
Mutual labels:  dns-server
Ssh Log To Influx
Send SSH authentication logs to influxdb with geohashing IP
Stars: ✭ 49 (-51.49%)
Mutual labels:  tcp-server
Simpledns
A very simple and small DNS Server to help understanding the protocol basics.
Stars: ✭ 62 (-38.61%)
Mutual labels:  dns-server
Simpleunitytcp
🖧 Simple Unity Project to show how TCP communication are builded in C# without multi-threading or Unity network (Unet) involved.
Stars: ✭ 22 (-78.22%)
Mutual labels:  tcp-server
Packetsender
Network utility for sending / receiving TCP, UDP, SSL
Stars: ✭ 1,349 (+1235.64%)
Mutual labels:  tcp-server
Docker Bind
Bind caching DNS server on Debian with wild-card domain support
Stars: ✭ 50 (-50.5%)
Mutual labels:  dns-server
Jt809 Tcp Server
parse JTT 809-2011 protocol of ministry of transportation
Stars: ✭ 83 (-17.82%)
Mutual labels:  tcp-server
Godsharp.socket
An easy-to-use .NET socket server and client.
Stars: ✭ 35 (-65.35%)
Mutual labels:  tcp-server
Acme Dns
Limited DNS server with RESTful HTTP API to handle ACME DNS challenges easily and securely.
Stars: ✭ 1,041 (+930.69%)
Mutual labels:  dns-server
Ioc2rpz
ioc2rpz is a place where threat intelligence meets DNS.
Stars: ✭ 67 (-33.66%)
Mutual labels:  dns-server
Tinytcpserver
A small tcp server working under Mono or .NET (4.0) and provides hooks for handling data exchange with clients (works under mono and .net). Behaviour/protocol/reaction could be specified via custom C# script.
Stars: ✭ 14 (-86.14%)
Mutual labels:  tcp-server
Dockerweb
A docker-powered bash script for shared web hosting management. The ultimate Docker LAMP/LEMP Stack.
Stars: ✭ 89 (-11.88%)
Mutual labels:  dns-server
Dpdk Ans
ANS(Accelerated Network Stack) on DPDK, DPDK native TCP/IP stack.
Stars: ✭ 925 (+815.84%)
Mutual labels:  tcp-server
Easytcp
Simple framework for TCP clients and servers. Focused on performance and usability.
Stars: ✭ 60 (-40.59%)
Mutual labels:  tcp-server
Simpletcp
Simple wrapper for TCP client and server in C# with SSL support
Stars: ✭ 99 (-1.98%)
Mutual labels:  tcp-server
Sliver
Adversary Simulation Framework
Stars: ✭ 1,348 (+1234.65%)
Mutual labels:  dns-server
Tor Router
A SOCKS, HTTP and DNS proxy for distributing traffic across multiple instances of Tor
Stars: ✭ 69 (-31.68%)
Mutual labels:  dns-server

Blackhat Go

License: MIT Organization made-with-GO

We are hackers and coders - in that order.

This means that, as hackers, we put a premium on function over elegance as time is always scarce.

When you need to quickly create a solution to a problem, style concerns come secondary.

TralahM TralahM

Why use Go for Hacking?

Prior to Go, you could prioritize ease of use by using dynamically typed languages-such as Python, Ruby or PHP-at the expense of performance and safety.

Alternatively, you could choose a statically typed language, like C or C++, that offers high performance and safety but isn't very user-friendly.

Go is a stripped of much of the ugliness of C, its primary ancestor, making development more user-friendly.

At the same time it's statically typed producing syntax errors at compile time increasing assurance that your code will actually run safely.

Many of the language's features are particularly useful for hackers and adversaries:

  1. Clean Package Management System
  2. Cross Compilation
  3. Rich Standard Library
  4. Concurrency

Downsides

  1. Large Binary size
  2. Very Verbose

Chapter Overview

  • Chapter 1: Go Fundamentals and Concepts
  • Chapter 2: TCP and Go: Scanners and Proxies
  • Chapter 3: HTTP Clients: Remote Interaction with Tools
  • Chapter 4: HTTP Servers: Routing and Middleware
  • Chapter 5: Exploiting DNS: Recon and More
  • Chapter 6: SMB and NTLM: A Peek Down the Rabbit Hole
  • Chapter 7: Databases and Filesystems: Pilfering and Abusing
  • Chapter 8: Packet Processing: Living on the Wire
  • Chapter 9: Exploit Code: Writing and Porting
  • Chapter 10: Extending Tools: Using Go Plugins and Lua
  • Chapter 11: Cryptography: Implementing and Attacking
  • Chapter 12: Windows: System Interaction and Analysis
  • Chapter 13: Steganography: Hiding Data
  • Chapter 14: Command and Control: Building a RAT
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].