Golang malware development framework
- Table of Contents
- Introduction
- Installation
- Types of functions included
- Requirements
- Disclaimer
- License
ColdFire II provides various methods useful for malware and security infra development in Golang.
Most functions are compatible with both Linux and Windows operating systems.
go get github.com/redcode-labs/Coldfire
Coming soon
- Logging
- Auxiliary
- Reconnaissance
- Evasion
- Administration
- Sandbox detection
- Disruptive
- Low-level
- Network manipulations
- Cryptography
- IO with specialized readers
- Tunneling
- Target processing
"github.com/google/gopacket"
"github.com/google/gopacket/layers"
"github.com/google/gopacket/pcap"
"github.com/robfig/cron"
"github.com/anvie/port-scanner"
"github.com/matishsiao/goInfo"
"github.com/fatih/color"
"github.com/minio/minio/pkg/disk"
"github.com/dustin/go-humanize"
"github.com/mitchellh/go-ps"
"github.com/GeertJohan/yubigo"
"github.com/go-sql-driver/mysql"
"github.com/ztrue/tracerr"
"github.com/yalue/elf_reader"
Developers are not responsible for any misuse regarding this tool. Use it only against systems that you are permitted to attack.
This software is under MIT license