NoF0rte / slack-slurpLinks
Pentesting post exploitation tool for slack
☆30Updated last month
Alternatives and similar repositories for slack-slurp
Users that are interested in slack-slurp are comparing it to the libraries listed below
Sorting:
- Custom queries list for BloodHound☆31Updated 5 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Scripts that automate portions of pentests.☆56Updated this week
- Artifact monitoring that ensures fairplay☆78Updated 11 months ago
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 9 months ago
- ☆42Updated 7 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 9 months ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆42Updated last year
- Yet Another LinkedIn Scraper☆33Updated 2 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Updated last year
- Discord C2 Profile for Mythic☆33Updated 10 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆91Updated 5 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆110Updated 4 months ago
- ☆47Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆78Updated 9 months ago
- Easy red team phishing with Puppeteer☆134Updated 2 years ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- ☆29Updated 2 years ago
- ☆54Updated 11 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- ☆62Updated 2 years ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆49Updated 3 months ago