Skip to content
View PixelZA's full-sized avatar

Block or report PixelZA

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
14 stars written in Go
Clear filter

In-depth attack surface mapping and asset discovery

Go 14,081 2,076 Updated Feb 4, 2026

cheat allows you to create and view interactive cheatsheets on the command-line. It was designed to help remind *nix system administrators of options for commands that they use frequently, but not …

Go 13,170 848 Updated Jul 29, 2024

The Havoc Framework

Go 8,137 1,168 Updated Dec 18, 2025

⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock

Go 7,106 662 Updated Mar 12, 2024

Fetch all the URLs that the Wayback Machine knows about for a domain

Go 4,301 537 Updated May 1, 2024

🔍 gowitness - a golang, web screenshot utility using Chrome Headless

Go 4,156 424 Updated Jan 21, 2026

Find domains and subdomains related to a given domain

Go 3,500 535 Updated Jun 7, 2024

A tool to perform Kerberos pre-auth bruteforcing

Go 3,231 467 Updated Aug 20, 2024

Take a list of domains and probe for working HTTP and HTTPS servers

Go 3,084 529 Updated Jun 22, 2024

Real-time HTTP Intrusion Detection

Go 3,084 252 Updated Feb 13, 2024

Subdomain Takeover tool written in Go

Go 2,024 352 Updated Aug 13, 2023

🐍 Manage and run your integration tests with efficiency - Venom run executors (script, HTTP Request, web, imap, etc... ) and assertions

Go 1,178 167 Updated Jan 6, 2026

Get GTFOBins info about a given exploit from the command line

Go 39 6 Updated Aug 4, 2024