InstallGoOffensive - Automated Go & Security Tools Installer InstallGoOffensive - Automated Go & Security Tools Installer

InstallGoOffensive - Automated Go & Security Tools Installer

Setting up a penetration testing environment can be tedious. You need to install Go, configure your PATH, and then manually install dozens of security tools one by one. This process is repetitive, error-prone, and time-consuming. That’s why I created InstallGoOffensive - a bash script that automates the entire setup process.

What InstallGoOffensive Does

InstallGoOffensive is a comprehensive bash script that:

1. Installs Go Automatically

  • Architecture Detection: Automatically detects your system architecture (AMD64 or ARM64)
  • Latest Version: Always installs the latest stable version of Go from the official website
  • PATH Configuration: Automatically adds Go to your PATH by updating ~/.bashrc or ~/.zshrc
  • Idempotent: Can be run multiple times without breaking or duplicating installations

2. Installs 20+ Security Tools

The script installs a curated collection of essential offensive security tools:

ToolPurpose
nucleiFast and customizable vulnerability scanner
subfinderSubdomain discovery tool
naabuFast port scanner
gowitnessWeb screenshot utility
httpxHTTP toolkit for probing web servers
notifyNotification utility for workflows
assetfinderFind domains and subdomains related to a given domain
waybackurlsFetch URLs from the Wayback Machine
gfWrapper around grep for pattern matching
shortscanSecurity scanner for cloud services
anewTool for adding lines to a file only if they don’t already exist
simplehttpserverSimple HTTP server
ffufFast web fuzzer
amassNetwork mapping of attack surfaces and external asset discovery
cloudreconCloud infrastructure reconnaissance tool
gauGet All URLs
gospiderFast web spider
kerbruteKerberos bruteforce utility
aws-enumeratorAWS enumeration tool
gronMake JSON greppable
qsreplaceQuery string replacement utility

3. Smart Installation Strategy

  • Dual Location: Installs tools to both $HOME/go/bin and /usr/local/bin
  • System-Wide Access: Tools are available system-wide, not just for your user
  • Error Handling: Provides clear feedback on which tools succeeded and which failed
  • Dependency Management: Automatically installs required build dependencies

Key Features

Cross-Platform Support

The script supports multiple Linux distributions:

  • Debian-based: Ubuntu, Kali Linux, Parrot OS, etc.
  • Arch-based: Arch Linux, BlackArch, etc.

It automatically detects your distribution and installs the appropriate dependencies:

  • For Debian: build-essential, libpcap-dev
  • For Arch: base-devel

Architecture-Aware

Whether you’re on an Intel/AMD system (AMD64) or an Apple Silicon/M1/M2 system (ARM64), the script detects your architecture and downloads the correct Go binary.

Easy to Customize

You can easily add more tools by adding lines to the script:

Terminal window
install_go_tool "tool_name" "github.com/author/repo" "binary_name"

Usage

Installation

  1. Clone the repository:
Terminal window
git clone https://github.com/solidshadw/installgoofensive.git
cd installgoofensive
  1. Make the script executable:
Terminal window
chmod +x install-tool.sh
  1. Run the script:
Terminal window
./install-tool.sh

The script will:

  • Detect your OS and architecture
  • Install Go (if not already installed)
  • Configure your PATH
  • Install all 20+ security tools
  • Provide a summary of successful/failed installations

Post-Installation

After running the script, restart your shell or source your configuration:

Terminal window
source ~/.bashrc # or ~/.zshrc if using zsh

You can then use any of the installed tools directly:

Terminal window
nuclei -version
subfinder -version
ffuf -V
amass -version

GitHub Repository

The script is open source and available on GitHub:

🔗 github.com/solidshadw/installgoofensive

You can fork it, customize the tool list, and contribute improvements. It’s designed to be modular - add or remove tools as needed for your workflow.

Automate the setup, focus on the hacking.


← Back to blog