blackhat-go

module
v0.0.0-...-153971b Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jul 22, 2023 License: GPL-3.0

README

Blackhat Go

made-with-GO

Code samples for the No Starch Press Black Hat Go

We are hackers and coders - in that order.

This means that, as hackers, we put a premium on function over elegance as time is always scarce.

When you need to quickly create a solution to a problem, style concerns come secondary.

Why use Go for Hacking?

Prior to Go, you could prioritize ease of use by using dynamically typed languages-such as Python, Ruby or PHP-at the expense of performance and safety.

Alternatively, you could choose a statically typed language, like C or C++, that offers high performance and safety but isn't very user-friendly.

Go is a stripped of much of the ugliness of C, its primary ancestor, making development more user-friendly.

At the same time it's statically typed producing syntax errors at compile time increasing assurance that your code will actually run safely.

Many of the language's features are particularly useful for hackers and adversaries:

  1. Clean Package Management System
  2. Cross Compilation
  3. Rich Standard Library
  4. Concurrency
Downsides
  1. Large Binary size
  2. Very Verbose

Chapter Overview

This repository uses third-party APIs and AI models and is not associated with or endorsed by the API providers or the original developers of the models. This project is intended for educational purposes only.

Please note the following:

Disclaimer: The APIs, services, and trademarks mentioned in this repository belong to their respective owners. This project is not claiming any right over them.

Responsibility: The author of this repository is not responsible for any consequences arising from the use or misuse of this repository or the content provided by the third-party APIs and any damage or losses caused by users' actions.

Educational Purposes Only: This repository and its content are provided strictly for educational purposes. By using the information and code provided, users acknowledge that they are using the APIs and models at their own risk and agree to comply with any applicable laws and regulations.

TralahM

TralahM

Organization

Directories

Path Synopsis
chapter10_Extendable_Tools_Using_Go_Plugins_and_LUA
chapter11_Cryptography_Implementing_and_Attacking
aes
gcm
rc2-brute/rc2
Package rc2 implements the RC2 cipher
Package rc2 implements the RC2 cipher
chapter12_Windows_System_Interaction_and_Analysis
chapter13_Steganography_Hiding_Data
chapter14_Command_and_Control_Building_a_RAT
grpcapi
Package grpcapi is a generated protocol buffer package.
Package grpcapi is a generated protocol buffer package.
chapter2_TCP_and_Go_Scanners_and_Proxies
chapter3_HTTP_Clients_Remote_Interaction_with_Tools
chapter4_HTTP_Servers_Routing_and_Middleware
chapter5_Exploiting_DNS_Recon_and_More
chapter6_SMB_and_NTLM_A_Peek_Down_the_Rabbit_Hole
chapter7_Databases_and_Filesystems_Pilfering_and_Abusing
chapter8_Packet_Processing_Living_on_the_Wire
ftp
chapter9_Exploit_Code_Writing_and_Porting
src

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL