LordCasser / blackhat-go

As hackers, we put a premium on function over elegance as time is always scarce. When you need to quickly create a solution to a problem, style concerns come secondary.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Blackhat Go

License: MIT Organization made-with-GO

We are hackers and coders - in that order.

This means that, as hackers, we put a premium on function over elegance as time is always scarce.

When you need to quickly create a solution to a problem, style concerns come secondary.

TralahM TralahM

Why use Go for Hacking?

Prior to Go, you could prioritize ease of use by using dynamically typed languages-such as Python, Ruby or PHP-at the expense of performance and safety.

Alternatively, you could choose a statically typed language, like C or C++, that offers high performance and safety but isn't very user-friendly.

Go is a stripped of much of the ugliness of C, its primary ancestor, making development more user-friendly.

At the same time it's statically typed producing syntax errors at compile time increasing assurance that your code will actually run safely.

Many of the language's features are particularly useful for hackers and adversaries:

  1. Clean Package Management System
  2. Cross Compilation
  3. Rich Standard Library
  4. Concurrency

Downsides

  1. Large Binary size
  2. Very Verbose

Chapter Overview

  • Chapter 1: Go Fundamentals and Concepts
  • Chapter 2: TCP and Go: Scanners and Proxies
  • Chapter 3: HTTP Clients: Remote Interaction with Tools
  • Chapter 4: HTTP Servers: Routing and Middleware
  • Chapter 5: Exploiting DNS: Recon and More
  • Chapter 6: SMB and NTLM: A Peek Down the Rabbit Hole
  • Chapter 7: Databases and Filesystems: Pilfering and Abusing
  • Chapter 8: Packet Processing: Living on the Wire
  • Chapter 9: Exploit Code: Writing and Porting
  • Chapter 10: Extending Tools: Using Go Plugins and Lua
  • Chapter 11: Cryptography: Implementing and Attacking
  • Chapter 12: Windows: System Interaction and Analysis
  • Chapter 13: Steganography: Hiding Data
  • Chapter 14: Command and Control: Building a RAT

About

As hackers, we put a premium on function over elegance as time is always scarce. When you need to quickly create a solution to a problem, style concerns come secondary.

License:GNU General Public License v3.0


Languages

Language:Go 97.0%Language:C 2.6%Language:Lua 0.4%