LanManVan: My Journey Building a Modular Security Framework in Go

Published: (December 28, 2025 at 05:48 AM EST)
2 min read
Source: Dev.to

Source: Dev.to

Introduction

A few months ago I started working on a personal project to create a flexible and powerful tool for security research and penetration testing. I wanted something inspired by Metasploit—an interactive framework where I could easily load, manage, and run different modules without dealing with heavy dependencies or complex setups.

Why Go?

I initially considered building it in Python (like many similar tools), but then chose Go. Go offers:

  • Incredible performance
  • Seamless cross‑compilation
  • Single binary output
  • Strong concurrency support

These features are perfect for a CLI tool that needs to feel snappy and reliable, even when running multiple tasks or handling modules efficiently.

Getting Started

Run the binary on Linux (or WSL on Windows) and you’ll get a clean interactive shell. Type help to see all available commands.

Features

  • Over 30 modules for recon, web testing, hashing, encoding, network tools, and more.
  • Real‑time IP location lookup with a single command.
  • A lightweight web crawler for basic reconnaissance—supports single‑ or multi‑threaded crawling and saves results neatly.

Architecture

  • Core framework written in Go for speed and simplicity.
  • Modules are written in Python 3 or Bash, making it easy for anyone to contribute.
  • Works natively on Linux (use WSL if you’re on Windows).

Open Source

The project is fully open source under the MIT license. You can check it out here:

Contributing

Contributions are welcome! Whether it’s new modules, bug fixes, UI improvements, or ideas, feel free to submit pull requests.

Closing

Happy (ethical) hacking!

Back to Blog

Related posts

Read more »