README ¶ Black Hat Go by Tom Steele, Chris Pattern, Dan Kottmann Black Hat Go book The examples from the book are published under MIT Licence HERE This repository is a companion to my learning progress. Go Fundamentals TCP, Scanners and Proxies (chap 2) HTTP Clients and Remote Interactions with Tools (chap 3) HTTP Servers, Routing, and Middleware (chap 4) [] Exploiting DNS (chap 5) [] Interacting with SMB and NTLM (chap 6) [] Abusing Databases and Filesystem (chap 7) [] Raw packet processing (chap 8) [] Writing and porting exploit code (chap 9) [] Go plugins and extendable tools (chap 10) [] Implementing and attacking cryptography (chap 11) [] Windows system interaction and analysis (chap 12) [] Hiding data with Steganography (chap 13) [] Building a command and control rat (chap 14) Expand ▾ Collapse ▴ Directories ¶ Show internal Expand all Path Synopsis chapter-2 echo-bufio echo-server netcat-bufio netcat-ioPipe scanner-chan scanner-wg simple_proxy chapter-3 basic basic-parsing bing-metadata/client bing-metadata/metadata metasploit-minimal/client metasploit-minimal/rpc shodan/cmd/shodan shodan/shodan chapter-4 credential_harvester hello_world multiplexer negroni_example simple_middleware simple_router template_example websocket_keylogger Click to show internal directories. Click to hide internal directories.