-
测试代码
```
func TestEngine(t *testing.T) {
engine, err := NewEngine()
if err != nil {
panic(err)
}
fmt.Println(engine.String())
client := &http.Client{
Transport: &http.Transport{
…
-
I would like to be able to run goby log tool like so: "goby log convert *.goby --format=HDF5"
-
![image](https://github.com/user-attachments/assets/3a10b586-212d-4373-aa83-edf5cb216d83)
regoo updated
2 weeks ago
-
如标题所示,使用Goby加载本地POC进行漏扫,但抓包发现流量中并无POC载荷,只有一些类似敏感路径探测的请求(如P1),但是报告中显示的有漏洞名称(如P2)。请问是本地POC没有加载成功导致的,还是Goby漏扫逻辑就是这样,先进行服务指纹识别,如果未发现相关服务则不会发送POC请求。
![image](https://github.com/user-attachments/assets/16d…
-
界面执行命令启动正常,客户端正常链接,
使用nohup命令重定向日志启动
nohup ./goby-cmd-linux -apiauth user:pass -mode api -bind 0.0.0.0:8361 >./runlog.log 2>&1 &
启动失败
2024/06/21 15:15:22 [ERROR] API Server exit: listen tcp: looku…
-
连接远程服务失败后无限报错:
发生未知错误,Goby 将尝试重启解决。若重启后错误仍存在,请反馈给我们。 Github issue
错误详情: Error
2024/04/23 14:22:54 common config info honeypot: 0 rabbish: 0 rabbish-md5: 0
2024/04/23 14:22:54 common config inf…
-
扫描就报错,重启还是一样
-
单机上用docker起server和work,work总是有问题
![QQ截图20240709215411](https://github.com/hanc00l/nemo_go/assets/96640306/da5de25b-f08d-4bf7-8ed4-64e66d5aa906)
-
![图片](https://github.com/gobysec/Goby/assets/129131089/b951d5c3-7bc6-4bcc-8c15-659f660e557f)
-
# goby红队版-可使用红队版功能-1288个poc
goby红队版-可使用红队版功能-1288个poc
[https://f5.pm/go-128101.html](https://f5.pm/go-128101.html)