{"id":15272395,"url":"https://github.com/ghosttroops/go4hacker","last_synced_at":"2025-04-05T01:06:35.961Z","repository":{"id":37974467,"uuid":"471863114","full_name":"GhostTroops/go4Hacker","owner":"GhostTroops","description":"Automated penetration and auxiliary systems, providing XSS, XXE, DNS log, SSRF, RCE, web netcat and other Servers,gin-vue-admin，online https://51pwn.com","archived":false,"fork":false,"pushed_at":"2025-03-12T23:04:23.000Z","size":12562,"stargazers_count":147,"open_issues_count":1,"forks_count":26,"subscribers_count":6,"default_branch":"main","last_synced_at":"2025-04-05T01:06:13.245Z","etag":null,"topics":["exp","exploits","framework","gin","gin-vue-admin","hacker","penetration","pentest","poc","rce","vue"],"latest_commit_sha":null,"homepage":"https://51pwn.com","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/GhostTroops.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"github":["hktalent"]}},"created_at":"2022-03-20T02:50:02.000Z","updated_at":"2025-03-25T16:35:40.000Z","dependencies_parsed_at":"2024-04-25T10:13:41.442Z","dependency_job_id":"474c5f8c-b4f7-4f9b-a1ba-d7bc676fc71d","html_url":"https://github.com/GhostTroops/go4Hacker","commit_stats":null,"previous_names":["ghosttroops/go4hacker","hktalent/go4hacker"],"tags_count":2,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/GhostTroops%2Fgo4Hacker","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/GhostTroops%2Fgo4Hacker/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/GhostTroops%2Fgo4Hacker/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/GhostTroops%2Fgo4Hacker/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/GhostTroops","download_url":"https://codeload.github.com/GhostTroops/go4Hacker/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247271530,"owners_count":20911587,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["exp","exploits","framework","gin","gin-vue-admin","hacker","penetration","pentest","poc","rce","vue"],"created_at":"2024-09-30T09:05:55.372Z","updated_at":"2025-04-05T01:06:35.943Z","avatar_url":"https://github.com/GhostTroops.png","language":"Go","readme":"[![Twitter](https://img.shields.io/twitter/url/http/Hktalent3135773.svg?style=social)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![Follow on Twitter](https://img.shields.io/twitter/follow/Hktalent3135773.svg?style=social\u0026label=Follow)](https://twitter.com/intent/follow?screen_name=Hktalent3135773) [![GitHub Followers](https://img.shields.io/github/followers/hktalent.svg?style=social\u0026label=Follow)](https://github.com/hktalent/)\n[![Top Langs](https://profile-counter.glitch.me/hktalent/count.svg)](https://51pwn.com)\n\n# Simple DNS log Server,easy to ACME DNS challenge\nlog easy send to elasticsearch\nhttps://github.com/hktalent/DNS_Server\n\n## online \nhttps://51pwn.com/\nmore demo: https://github.com/hktalent/51Pwn-Platform\n\n# go4Hacker\n\nAutomated penetration and auxiliary systems, providing XSS, XXE, DNS log, SSRF, RCE, web netcat and other Servers\nmore to see:http://github.com/hktalent/goSqlite_gorm\n\u003cimg width=950 src=https://user-images.githubusercontent.com/18223385/168472883-4bfb402c-8c90-46c0-a8db-a5b22b8b6a25.gif\u003e\n\n\n## features\n- gin\n- vue\n- suport http2, -ServerPem -ServerKey\n- Standard Domain Resolve Service\n- DNSLOG\n- HTTPLOG\n- Rebinding/CustomRebinding\n- Push (callback)\n- Multi-user\n- dockerlized\n- python/golang client sdk\n- as a standard name resolve service with support `A,CNAME,TXT,MX`\n- xip\n\n### docker \nsee\nhttps://hub.docker.com/repository/docker/hktalent/51pwn4hacker\n\n\n### DNSLOG\n\nsuper admin user: `admin`\npassword will be showed in console logs when first run.\nyou can change it by subcommand `resetpw`\n\n![](https://s1.ax1x.com/2020/08/31/dXPba4.png)\n\n\n### HTTPLOG\n![](https://s1.ax1x.com/2020/08/31/dXiiIH.png)\n\n\n## build frontend\n\nrequirements: \n\n`yarn`\n\n```\nbrew install yarn\nnpm i -g npm@latest\nnpm install --global yarn\ncd frontend\nyarn install\nyarn add cache-loader\nrm -rf ../dist\nyarn build --outDir ../dist\ncd ..\n\n```\n\t\n## build backend\n\nrequirements: \n\n`golang \u003e= 1.18`\n`node \u003e= 14.17.6`\n`npm \u003e= 8.5.5`\n`yarn \u003e= 1.22.17`\n\n```bash\ngo build\n\n# set admin passwd\n./go4Hacker resetpw -u admin\n\n#eg : 实际运行时，192.168.0.107 调整为公网 ip地址，也就是域名 51pwn.com 指向的公网ip地址\n./go4Hacker serve -4 192.168.0.107 -domain 51pwn.com -lang zh-CN\nopen http://0.0.0.0:8080\n\n```\n\n## docker build\n\n```bash\ndocker build -t \"user/go4Hacker\" .\n```\n\nFor Chinese user:\n\n```bash\ndocker build -t \"user/go4Hacker\" -f DockerfileCN .\n```\n\n## RUN\n\ni. Register your domain, eg: `example.com`\nSet your DNS Server point to your host, eg: ns.example.com =\u003e 100.100.100.100\nSome registrar limit set to NS host, your can set two ns host point to only one address.\nSome registrar to ns host must be different ip address, you can set one to a fake addresss and then change to the same addresss\n\n\nii. self build\n\n```bash\ndocker run -p80:8080 -p53:53/udp \"user/go4Hacker\"  serve -domain yourdomain.com -4 100.100.100.100\n```\n\nor use dockerhub\n\n```bash\ndocker pull \"sort/go4Hacker\"\ndocker run -p80:8080 -p53:53/udp -p80:8080  \"sort/go4Hacker\" serve -domain yourdomain.com -4 100.100.100.100\n```\n\niii. access http://100.100.100.100\n\n## Doc\n\nguest/guest123\n\n\n## TODO \u0026\u0026 Known Issues\n\n- [ ] admin user can read all recordds\n- [ ] allow Anonymous user access document page\n- [ ] enable custom rebinding stage two setting\n- [ ] fix login logical problem\n\n## build from\nhttps://github.com/chennqqi/go4Hacker\nbut the go and node js modules here are updated to the latest\n\n\n# Donation\n| Wechat Pay | AliPay | Paypal | BTC Pay |BCH Pay |\n| --- | --- | --- | --- | --- |\n|\u003cimg src=https://raw.githubusercontent.com/hktalent/myhktools/main/md/wc.png\u003e|\u003cimg width=166 src=https://raw.githubusercontent.com/hktalent/myhktools/main/md/zfb.png\u003e|[paypal](https://www.paypal.me/pwned2019) **miracletalent@gmail.com**|\u003cimg width=166 src=https://raw.githubusercontent.com/hktalent/myhktools/main/md/BTC.png\u003e|\u003cimg width=166 src=https://raw.githubusercontent.com/hktalent/myhktools/main/md/BCH.jpg\u003e|\n\n\n","funding_links":["https://github.com/sponsors/hktalent","https://www.paypal.me/pwned2019"],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fghosttroops%2Fgo4hacker","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fghosttroops%2Fgo4hacker","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fghosttroops%2Fgo4hacker/lists"}