Golang malware development framework
- Table of Contents
- Introduction
- Installation
- Types of functions included
- Requirements
- Disclaimer
- License
ColdFire II provides various methods useful for malware and security infra development in Golang.
Most functions are compatible with both Linux and Windows operating systems.
go get github.com./redcode-labs/Coldfire
Coming soon
- Logging
- Auxiliary
- Reconnaissance
- Evasion
- Administration
- Sandbox detection
- Disruptive
- Low-level
- Network manipulations
- Cryptography
- IO with specialized readers
- Tunneling
- Target processing
"github.com./google/gopacket"
"github.com./google/gopacket/layers"
"github.com./google/gopacket/pcap"
"github.com./robfig/cron"
"github.com./anvie/port-scanner"
"github.com./matishsiao/goInfo"
"github.com./fatih/color"
"github.com./minio/minio/pkg/disk"
"github.com./dustin/go-humanize"
"github.com./mitchellh/go-ps"
"github.com./GeertJohan/yubigo"
"github.com./go-sql-driver/mysql"
"github.com./ztrue/tracerr"
"github.com./yalue/elf_reader"
Developers are not responsible for any misuse regarding this tool. Use it only against systems that you are permitted to attack.
This software is under MIT license