GoBot2
ransomwhere
GoBot2 | ransomwhere | |
---|---|---|
1 | 3 | |
700 | 184 | |
- | - | |
0.0 | 4.5 | |
over 2 years ago | 2 months ago | |
Go | Go | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
GoBot2
-
How to achieve interactive communication between a Go app and an exec'ed app via stdin/stdout?
The answer, once more, is to 'use pipes' and to take a look at this code. Unfortunately, that's for Windows only, which I'm most definitely not using...
ransomwhere
What are some alternatives?
neurax - A framework for constructing self-spreading binaries
emp3r0r - Linux/Windows post-exploitation framework made by linux user
turbo-attack - A turbo traffic generator pentesting tool to generate random traffic with random mac and ip addresses in addition to random sequence numbers to a particular ip and port.
MicroSCOPE - Static analysis tool that can identify potential ransomware on PE or ELF files based on heuristics
ToRat - ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Coldfire - Golang malware development library
remco - remco is a lightweight configuration management tool
putler-doser - A russian propoganda websites takedown tool
YaraHunter - 🔍🔍 Malware scanner for cloud-native, as part of CI/CD and at Runtime 🔍🔍
golang-repost-bot - A bot written in Go that reposts stuff from subreddits on Twitter.
REconfig-linux - Configuration Extractor for the Linux variant of REvil Ransomware