Golang malware development framework
## Table of Contents - [Table of Contents](#table-of-contents) - [Introduction](#introduction) - [Installation](#installation) - [Types of functions included](#types-of-functions-included) - [Requirements](#requirements) - [Disclaimer](#disclaimer) - [License](#license) ## Introduction ColdFire II provides various methods useful for malware and security infra development in Golang. Most functions are compatible with both Linux and Windows operating systems. ## Installation `go get github.com/redcode-labs/Coldfire` ## Docs Coming soon ## Types of functions included (for maldev) * Logging * Auxiliary * Reconnaissance * Evasion * Administration * Sandbox detection * Disruptive * Low-level ## Types of functions included (for infra) * Network manipulations * Cryptography * IO with specialized readers * Tunneling * Target processing ## Requirements ``` "github.com/google/gopacket" "github.com/google/gopacket/layers" "github.com/google/gopacket/pcap" "github.com/robfig/cron" "github.com/anvie/port-scanner" "github.com/matishsiao/goInfo" "github.com/fatih/color" "github.com/minio/minio/pkg/disk" "github.com/dustin/go-humanize" "github.com/mitchellh/go-ps" "github.com/GeertJohan/yubigo" "github.com/go-sql-driver/mysql" "github.com/ztrue/tracerr" "github.com/yalue/elf_reader" ``` ## Disclaimer Developers are not responsible for any misuse regarding this tool. Use it only against systems that you are permitted to attack. ## License This software is under MIT license