{"id":13577156,"url":"https://github.com/gobysec/Goby","last_synced_at":"2025-04-05T11:31:29.228Z","repository":{"id":38247136,"uuid":"189960360","full_name":"gobysec/Goby","owner":"gobysec","description":"Attack surface mapping","archived":false,"fork":false,"pushed_at":"2024-02-29T09:48:14.000Z","size":17600,"stargazers_count":1444,"open_issues_count":117,"forks_count":152,"subscribers_count":30,"default_branch":"master","last_synced_at":"2025-03-23T09:23:31.691Z","etag":null,"topics":["cve","cve-2023-22527","cve-2024-0204","cve-2024-20931","cve-2024-21887","cve-2024-21893","cve-2024-23897","cve-2024-25600","exp","exploit","hacking","networking","pentesting","portscanning","proxyshell","red-team","scan-tool","security","security-tools","vulnerability-research"],"latest_commit_sha":null,"homepage":"https://gobies.org/","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/gobysec.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2019-06-03T07:56:11.000Z","updated_at":"2025-03-22T20:11:44.000Z","dependencies_parsed_at":"2023-02-10T09:16:13.430Z","dependency_job_id":"5d0a7bce-b68c-4dd7-90c2-e63f360064ac","html_url":"https://github.com/gobysec/Goby","commit_stats":null,"previous_names":[],"tags_count":21,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/gobysec%2FGoby","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/gobysec%2FGoby/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/gobysec%2FGoby/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/gobysec%2FGoby/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/gobysec","download_url":"https://codeload.github.com/gobysec/Goby/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247330797,"owners_count":20921696,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cve","cve-2023-22527","cve-2024-0204","cve-2024-20931","cve-2024-21887","cve-2024-21893","cve-2024-23897","cve-2024-25600","exp","exploit","hacking","networking","pentesting","portscanning","proxyshell","red-team","scan-tool","security","security-tools","vulnerability-research"],"created_at":"2024-08-01T15:01:18.640Z","updated_at":"2025-04-05T11:31:29.206Z","avatar_url":"https://github.com/gobysec.png","language":null,"readme":"# Welcome to Goby\r\n**Goby** is a new generation network security assessment tool. It can efficiently and practically scan vulnerabilities while sorting out the most complete attack surface information for a target enterprise. Goby can also quickly penetrate the company intranet based on a company's vulnerabilities exposed to the Internet.  We strive for Goby to become a more vital tool that can benchmark against hackers' actual attack methods and help companies effectively understand and respond to cyber-attacks. \r\n\r\n[Goby Official URL](https://gobies.org/)\r\n\r\n### 0x001 Demo\r\n[![5s8l2F.gif](https://z3.ax1x.com/2021/10/21/5s8l2F.gif)](https://imgtu.com/i/5s8l2F)\r\n### 0x002 Download and install \r\n  [Goby download link](https://gobies.org/)\r\n  [Goby FAQ](https://gobies.org/faq.html)\r\n  \r\n  Goby currently uses Golang  development, uses `Electron` and `VUE` as the front-end framework, supports windows, MacOS, and Linux without installation. Goby is based on network scanning, therefore permission is required to identify the NIC before using it.The installation methods of different platforms are as follows:\r\n\r\n1. Windows \r\n   Download the [`Npcap`](https://nmap.org/npcap/dist/npcap-0.9995.exe) and install it.\r\n2. MacOS \r\n   Run the following command：\r\n\r\n```\r\n1.  cd /dev\r\n2.  sudo chown $USER:admin bp*\r\n```\r\n   For more information, see [Goby WiKi](https://github.com/gobysec/Goby/wiki)\r\n\r\n### 0x003 Preset field description\r\n\r\n**1. Rule bases** \r\n  Goby has built in more than 100,000 rule recognition engines. The coverage of hardware types includes `Network devices`, `IoT devices`, `Network Security products`, `office devices`, etc. The coverage of software types includes: `CRM`,`CMS`,`EMAIL`,`OA system`, etc.\r\n\r\n**2. Protocol** \r\n  Goby has built in more than 200 protocol recognition engines, including: `Network protocols`, `Database protocols`, `IoT protocols` , `ICS protocols`, etc.\r\n\r\n**3. Port** \r\n  In addition to common ports, Goby also groups ports based on security practices, including: `Enterprises`, `Cafes`, `Hotels`, `Airports`, `Databases`, `IoT`, `SCADA`, `ICS` and `Back door detection`.\r\n\r\n**4. Common vulnerabilities and weak passwords** \r\n  Goby covers common critical vulnerabilities such as `Weblogic` and `Tomcat`, as well as preset account information of more than 1,000 devices.\r\n\r\n- [CVE-2020-2551](https://github.com/gobysec/GobyVuls/blob/master/WebLogic/CVE-2020-2555)\r\n- [CVE-2020-2555](https://github.com/gobysec/GobyVuls/blob/master/WebLogic/CVE-2020-2555)\r\n- CVE-2020-1938 \r\n- CVE-2020-10189\r\n- CVE-2020-11651\r\n- CVE-2020-11710\r\n- [CVE-2020-7961](https://github.com/gobysec/GobyVuls/blob/master/LiferayPortal/CVE-2020-7961)\r\n- CVE-2020-12116\r\n- CVE-2019-10758\r\n- CVE-2019-3799\r\n- [CVE-2019-19781](https://github.com/gobysec/GobyVuls/blob/master/Citrix/CVE-2019-19781)\r\n- CVE-2019-3948\r\n- [CVE-2018-1000861](https://github.com/gobysec/GobyVuls/tree/master/Jenkins/CVE-2018-1000861)\r\n- [CVE-2018-7600](https://github.com/gobysec/GobyVuls/tree/master/Drupal/CVE-2018-7600)\r\n- CVE-2018-1297\r\n- CVE-2018-13379\r\n- [CVE-2017-5638](https://github.com/gobysec/GobyVuls/tree/master/Struts2/S2-046(CVE-2017-5638))\r\n- CVE-2017-5878\r\n- CVE-2017-17215\r\n- [CVE-2017-1000353](https://github.com/gobysec/GobyVuls/blob/master/Jenkins/CVE-2017-1000353)\r\n- CVE-2016-4437\r\n- [CVE-2016-3088](https://github.com/gobysec/GobyVuls/tree/master/ActiveMQ/CVE-2016-3088)\r\n- [CVE-2013-2251](https://github.com/gobysec/GobyVuls/tree/master/Struts2/S2-016(CVE-2013-2251))\r\n- CVE-2011-3556\r\n- [ThinkPHP2.1_RCE](https://github.com/gobysec/GobyVuls/tree/master/ThinkPHP/ThinkPHP2.1_RCE)\r\n- [ThinkPHP5_RCE](https://github.com/gobysec/GobyVuls/tree/master/ThinkPHP/ThinkPHP5_RCE)\r\n- Constantly updating...… \r\n\r\n### 0x004 FAQ\r\n\r\n  For more information about Goby FAQ, please visit [here](https://gobies.org/faq.html) \r\n\r\n### 0x005 Goby community \r\n\r\n- Contribute POC\r\n\r\n  - First need to read [Goscanner_POC\u0026#x2f;EXP _Writing_Manual](https://github.com/gobysec/Goby/wiki/Vulnerability-writing-guide(%E6%BC%8F%E6%B4%9E%E7%BC%96%E5%86%99%E6%8C%87%E5%8D%97))\r\n  - Then read [Custom PoC Query Rule](https://github.com/gobysec/Goby/wiki/Query-Rule(Goby-Query-%E7%BC%96%E5%86%99%E6%8C%87%E5%8D%97))\r\n\r\n  Please read [here](https://github.com/gobysec/Goby/blob/master/Feedback.md) first if you submit an error or demand suggestion.\r\n\r\nIf you have a functional type of issue, you can raise an issue on GitHub or in the discussion group below:\r\n\r\n1. GitHub issue: https://github.com/gobysec/Goby/issues\r\n2. WeChat Group: First add my personal WeChat: **gobyteam**, I will add everyone to the official WeChat group of Goby. \r\n\r\n","funding_links":[],"categories":["Others","Vulnerability Scanning","📦 Legacy \u0026 Inactive Projects"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgobysec%2FGoby","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fgobysec%2FGoby","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fgobysec%2FGoby/lists"}