Skip to content

Latest commit

 

History

History
executable file
·
81 lines (61 loc) · 1.64 KB

README.md

File metadata and controls

executable file
·
81 lines (61 loc) · 1.64 KB

ColdFire II


Golang malware development framework

Table of Contents

Introduction

ColdFire II provides various methods useful for malware and security infra development in Golang.

Most functions are compatible with both Linux and Windows operating systems.

Installation

go get github.com/redcode-labs/Coldfire

Docs

Coming soon

Types of functions included (for maldev)

  • Logging
  • Auxiliary
  • Reconnaissance
  • Evasion
  • Administration
  • Sandbox detection
  • Disruptive
  • Low-level

Types of functions included (for infra)

  • Network manipulations
  • Cryptography
  • IO with specialized readers
  • Tunneling
  • Target processing

Requirements

"github.com/google/gopacket"
"github.com/google/gopacket/layers"
"github.com/google/gopacket/pcap"
"github.com/robfig/cron"
"github.com/anvie/port-scanner"
"github.com/matishsiao/goInfo"
"github.com/fatih/color"
"github.com/minio/minio/pkg/disk"
"github.com/dustin/go-humanize"
"github.com/mitchellh/go-ps"
"github.com/GeertJohan/yubigo"
"github.com/go-sql-driver/mysql"
"github.com/ztrue/tracerr"
"github.com/yalue/elf_reader"

Disclaimer

Developers are not responsible for any misuse regarding this tool. Use it only against systems that you are permitted to attack.

License

This software is under MIT license