• Stars
    star
    140
  • Rank 256,361 (Top 6 %)
  • Language
    Shell
  • Created almost 3 years ago
  • Updated over 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

OpenVPN Project Dynamically Pulling .ovpn configuration files for instant connections without the hassle of searching for a source

GOLIAD

Author: Jonathan Scott @jonathandata1

GOLIAD - VPN Service For All

CURRENT VERSION 1.3 - BETA

MAC ADDRESS SPOOFING NOW AVAILABLE

  • Change your Wi-Fi, Ethernet, or Bluetooth MAC Address instantly, and connect to the VPN of your choice
  • This helps you with anonymity and stop IDS/IPS systems from banning your computers MAC Address
  • NOTE: You must have homebrew installed on your LINUX machine to install spoof-mac

OpenVPN Client that dynamically pulls the latest regional, secure, & most reliable .ovpn configuration files for instant connections without the hassle of searching for a source.

  • No Logging
  • No Tracing
  • No Advertisments
  • No Bloatware
  • Scrict .ovpn security protocols
  • Sourcing comes from Universities, and other OpenVPN supporters around the world
  • 100% FREE To Use ALWAYS!
  • Goliad NEVER BINDS helping keep your host data secure
  • No Configurations Needed
  • No Complicated Setup
  • 100% customizable for added security, certificates, and more
  • Run Goliad and you're now connected

HOW TO USE

Step 1.

option #1 git clone https://github.com/jonathandata1/Goliad.git
option #2 download this zip file https://github.com/jonathandata1/Goliad/archive/refs/heads/master.zip

Step 2.

If you chose option #1 cd Goliad
If you chose option #2 unzip master.zip and open the folder Goliad

Step 3.

Open a terminal run
If you chose option #1 & #2
In the terminal type ./goliad.sh

I will make a video for those that don't have a lot of experience in a terminal

Step 4.

In the Goliad software press option #1 Connect To VPN
Select a VPN from the list
Once you have done this, then press enter
You will now be connected to a VPN!
To check what country you are connected to in your terminal
curl ipinfo.io 

The .ovpn sources are already download for you because some people's connections may be really slow and this process will take a while

Sources of Servers (This will happen, I just ran into some blocks when pulling data...oops!)

The configurations are pulled from vpngate.com mirrors that are updated daily. The .ovpn configurations are pulled from vpngate.com mirrors as to not cause disturbance to vpngate's main servers meant for general single use connections. I actually am not sure if the mirrors are supposed to be used this way, but...it seems like a more respectful way to go. :)

Dependencies

Openvpn

MacOS

Make sure you have Homebrew installed first

1. /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"

2. brew install openvpn

Linux

Option 1: brew install openvpn (if you have Homebrew installed)

Option 2: sudo apt install openvpn

Option 3: sudo yum install -y openvpn

Spoof-MAC

MacOS

1. brew install spoof-mac

Linux

brew install spoof-mac

Peco

MacOS

1. brew install peco

Linux

Option 1: brew install peco (if you have Homebrew installed)

Option 2: sudo apt install peco

Option 3: go get github.com/peco/peco/cmd/peco

Lynx

MacOS

1. brew install lynx

Linux

Option 1: brew install lynx (if you have Homebrew installed)

Option 2: sudo apt install lynx

Option 3: yum install lynx

More Repositories

1

pegasus_spyware

decompiled pegasus_spyware
Smali
1,997
star
2

ios_15_rce

Remote Code Execution V1 For iOS 15 sent through airdrop after the device was connected to a trusted host
JavaScript
314
star
3

2022_beijing

Decompiled 2022 Beijing iOS & Android Apps
HTML
236
star
4

cyfon

bug bounty pull all subdomain data, hacker tools
Shell
127
star
5

pegasus_spyware_detection_utils_ios_aos

After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and AndroidOS systems I have created tools that will be able to identify & validate the presence of the spyware on your mobile devices, and tablets. Initial detection points were derived from the mvt-project.
Roff
72
star
6

tyr

Android Recon & Research Tools
Shell
71
star
7

mobile_forensics

Methods & Tools for Mobile Malware Spyware & Forensics
Roff
60
star
8

atsend

Send AT Commands To Samsung & LG Devices Better Easier Than You Ever Imagined
Shell
36
star
9

departmentofdefense

A list of Department of Defense Endpoints to check for DoD VDP (Vulnerability Disclosure Program)
33
star
10

microsoft_azure_personally_identifiable_info_leak

Microsoft Azure Told Me This Was No Big Deal, and by default users data from an organization you are part of is leaking in aad.portal.azure.com, the access in my report is not disabled by default and gives a general user the ability to create tenants, assign users to a tenant, assign roles, and invite external users. Most organizations do not even know these permissions exist. When I first found this data leak there were 100,000+ exposed PII points, and the organization immediately fixed it. When I reported this to Microsoft they said this is how it is supposed to work. Enjoy - Jonathan Scott
32
star
11

ios_15.0.2_RCE_V2.1

iOS 15.0.2 RCE v2.1 Airdrop Delivered Data Wipe
JavaScript
30
star
12

mass_data_parse

Parse Through Gigs of Data with 1 line of code!
Shell
29
star
13

phone_hacking_6

Phone Hacking Series 6 - iPhone Backdoor - binaries
Perl
25
star
14

ios_logging

Mobileconfigurations that you will need to get extensive iOS logs
22
star
15

ios_15.0.1_entitlements_dump

Full Dump of iOS 15.0.1 Entitlements
20
star
16

io

Monitor Live USB Plug In & Plug Out Events
Python
18
star
17

bash_deploy

Create BASH Script Binaries, Historical Versions of Your Scripts & Binaries, Never create an alias again, never use sh or ./ to execute a shell script anywhere in your terminal
Shell
18
star
18

ios_15.0.2_data_leak

ISO.org Data Leak Due to Apple's failure to validate link references from a 2015 code comment
18
star
19

iOS-15-Siri-Database-Persistance-When-Not-Enabled

Part of my iOS 15 experiment shows shows all the data that Siri is collecting even though I have NEVER enabled siri on my iPhone 11 Pro
14
star
20

android_wipe

Bypass Auth Android Data Wipe
14
star
21

Pegasus-CatalanGate-False-Positives

Using Citizen Lab and Amnesty's mvt-tool I detected false positive results of spyware infection due to manual manipulation of "known" malicious domains
13
star
22

verizon_data_leak

Verizon Media Data Leak - PII & PHI - Verizon Claims No Server Issue
10
star
23

Vendor-ID-Product-ID-Search

Easily Input Vendor ID's & Product ID's of USB Devices
Shell
10
star
24

Forging-Pegasus

Showing how MVT-Tool can create false positive Pegasus spyware results
8
star
25

cleanc0de

JavaScript
7
star
26

ghidra_dump

NSA ghidra tools strings dump
6
star
27

Car-Vin-Lookup

Easily Lookup Car Vin Data
5
star
28

verizon_samsung_auto_enable_adb

Verizon Spyware Tech
Shell
5
star
29

qhash

easily identify a hash or encoding by pasting the hash into your terminal
4
star
30

bad_keyboard_arduino

Turn your arduino into a bad keyboard that will execute keyboard strokes on plugin
3
star
31

MMS_Exploit_Endpoints

2
star
32

Amnesty-Investigations-Fact-Check

1
star