Offensive GoLang is is a collection of Go packages containing commonly used cyber adversary emulation functions. Offensive GoLang accomplishes nothing by itself; rather, it is intended to support rapid red team tool development by providing common functions in a modular format.
Check out my presentation at SANS Pen Test HackFest Summit 2021.
Slides can be found here.
- Go 1.12.7
Clone this repository using Go get:
go get github.com/bluesentinelsec/OffensiveGoLang
Create a new Go source file, main.go, with the following code:
package main
import (
"github.com/bluesentinelsec/OffensiveGoLang/pkg/windows/execution"
)
func main() {
execution.RunPowerShell("notepad.exe")
}
Execute source file:
go run main.go
Offensive GoLang includes common functions such as downloading/uploading files, executing shellcode, establishing persistence, and more.
Take a look at the various sub packages to find interesting functions.
Offensive GoLang follows the basic feature branch GIT flow. Create a feature branch off of master and when ready, submit a merge request. Make branch names and commits descriptive. Keep features concise and modular. Overly clever code is discouraged.
Special thanks to the developers of these great projects, whose works served as helpful references throughout the development of Offensive GoLang: