About
Attack surface mapping
The new generation of network security technology achieves rapid security emergency through the establishment of a complete asset database for the target.
Info
1 | 127.0.0.1:15001 |
Github : https://github.com/XRSec/Goby-Docker.git
Use
InStall
1 | docker run -it --name goby -p 15001:15001 -e password=password -e port=15001 xrsec/goby:latest |
Goby_Desktop
Compile again
Github : https://github.com/XRSec/Goby-Docker.git
1 | git clone https://github.com/XRSec/AWVS14-Docker.git |
Thanks to the list
Gobysec : https://github.com/gobysec/Goby
Vipersec : https://www.yuque.com/vipersec
XRSec has the right to modify and interpret this article. If you want to reprint or disseminate this article, you must ensure the integrity of this article, including all contents such as copyright notice. Without the permission of the author, the content of this article shall not be modified or increased or decreased arbitrarily, and it shall not be used for commercial purposes in any way
本博客所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明来源 XR-SEC!