Tag: go

  • Python vs. Go Subdomain Enumeration & DNS

    Concurrency plays a pivotal role in the performance of subdomain enumeration, particularly when dealing with a large number of DNS resolutions. In this article, we will explore the concurrency models of Python and Go and delve into the theoretical limits on the maximum number of DNS resolvers that could be queried simultaneously in each language.…

  • Nmap, Python & Go Network Pentesting

    In the realm of cybersecurity, the quest for securing internal networks has led to the integration of powerful tools and programming languages. Nmap, a stalwart in network reconnaissance, takes center stage in this exploration. We will delve into the intricacies of utilizing Nmap in conjunction with Python and Go for internal network pentesting. As organizations…

  • Go Offensive Network Pentesting

    This is my post on go offensive network pentesting. In the rapidly evolving realm of offensive security, the selection of a programming language becomes a strategic choice. Enter Go, affectionately known as Golang, a powerhouse that amalgamates simplicity, efficiency, and robust concurrency. This article delves deep into the evolution of Go and its central role…

  • Benchmarking Goroutines in Go with Code

    Benchmarking Goroutines in Go involves measuring the performance of concurrent code execution. It’s important to note that the actual performance can vary based on factors such as hardware, operating system, and the specific nature of the tasks being performed. Here’s a simple example of a benchmark comparing the execution time of a task with and…

  • Multithreaded Applications with Goroutines

    Introduction: In the era of relentless digital expansion, where the demands for high-performance, concurrent, and efficient applications are ever-growing, Go (Golang) emerges as a standout with its distinctive concurrency model built around Goroutines. This comprehensive exploration delves into the intricate world of building large-scale multithreaded applications with Goroutines in Go, backed by specific research findings,…

  • Leverage Goroutines: Vulnerability Discovery

    GoRoutines In today’s dynamic cybersecurity landscape, where threats evolve rapidly, goroutines can be leveraged for their efficiency and effectiveness of vulnerability discovery, & play a pivotal role in securing digital networks. This article explores the groundbreaking use of Goroutines in Go for security assessments, drawing on specific research findings and case studies. We will delve…

  • Python and Go for Subdomain Enumeration

    Introduction Subdomain enumeration is a critical task in cybersecurity, and the efficiency of this process depends heavily on the concurrency model of the programming language used. In this extensive analysis, we will delve into the concurrency models of Python and Go, explore their capabilities in subdomain enumeration, and theoretically assess the maximum number of DNS…

  • Python vs. Go in Subdomain Enumeration

    Subdomain enumeration is a critical aspect of cybersecurity, serving as the foundation for identifying potential vulnerabilities within an organization’s online infrastructure. Python and Go, both versatile programming languages, are often utilized in the development of subdomain enumeration tools. In this article, we will conduct a code-level comparison of Python and Go for subdomain enumeration, exploring…

  • Python vs. Go in Cybersecurity

    Cyber demands robust and efficient programming languages to develop tools and applications that can withstand the relentless challenges posed by cyber threats – and this is the defacto post on python or go in cybersecurity. I actually wrote a post specifically on python vs GO in subdomain enumeration – here and here. ! Subdomain enumeration…

  • Golang vs Python with Benchmarks

    In cybersecurity, the selection of a programming language wields considerable influence over the security posture of networking applications. In this comprehensive exploration, we delve into the security intricacies of Golang and Python, leveraging not only research studies and real-world case studies but also introducing benchmarks and examining instances where actual codebases fell victim to cyber…