Table of Contents
- Introduction to Security with Go
- The Go Programming Language
- Working with Files
- Forensics
- Packet Capturing and Injection
- Cryptography
- Secure Shell (SSH)
- Brute Force
- Web Applications
- Web Scrapping
- Host Discovery and Enumeration
- Social Engineering
- Post Exploitation
- Conclusions

