Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Attack surface mapping

NotificationsYou must be signed in to change notification settings

gobysec/Goby

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

46 Commits
 
 
 
 
 
 

Repository files navigation

Goby is a new generation network security assessment tool. It can efficiently and practically scan vulnerabilities while sorting out the most complete attack surface information for a target enterprise. Goby can also quickly penetrate the company intranet based on a company's vulnerabilities exposed to the Internet. We strive for Goby to become a more vital tool that can benchmark against hackers' actual attack methods and help companies effectively understand and respond to cyber-attacks.

Goby Official URL

0x001 Demo

5s8l2F.gif

0x002 Download and install

Goby download linkGoby FAQ

Goby currently uses Golang development, usesElectron andVUE as the front-end framework, supports windows, MacOS, and Linux without installation. Goby is based on network scanning, therefore permission is required to identify the NIC before using it.The installation methods of different platforms are as follows:

  1. WindowsDownload theNpcap and install it.
  2. MacOSRun the following command:
1.  cd /dev2.  sudo chown $USER:admin bp*

For more information, seeGoby WiKi

0x003 Preset field description

1. Rule basesGoby has built in more than 100,000 rule recognition engines. The coverage of hardware types includesNetwork devices,IoT devices,Network Security products,office devices, etc. The coverage of software types includes:CRM,CMS,EMAIL,OA system, etc.

2. ProtocolGoby has built in more than 200 protocol recognition engines, including:Network protocols,Database protocols,IoT protocols ,ICS protocols, etc.

3. PortIn addition to common ports, Goby also groups ports based on security practices, including:Enterprises,Cafes,Hotels,Airports,Databases,IoT,SCADA,ICS andBack door detection.

4. Common vulnerabilities and weak passwordsGoby covers common critical vulnerabilities such asWeblogic andTomcat, as well as preset account information of more than 1,000 devices.

0x004 FAQ

For more information about Goby FAQ, please visithere

0x005 Goby community

If you have a functional type of issue, you can raise an issue on GitHub or in the discussion group below:

  1. GitHub issue:https://github.com/gobysec/Goby/issues
  2. WeChat Group: First add my personal WeChat:gobyteam, I will add everyone to the official WeChat group of Goby.

[8]ページ先頭

©2009-2025 Movatter.jp