Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
☆774Jan 31, 2025Updated last year
Alternatives and similar repositories for SlackPirate
Users that are interested in SlackPirate are comparing it to the libraries listed below
Sorting:
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Aug 12, 2025Updated 6 months ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆114Feb 21, 2023Updated 3 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆532Mar 7, 2022Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,034Jul 12, 2025Updated 7 months ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 4 months ago
- Electron based screenshot scanner☆68Feb 4, 2023Updated 3 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆250Oct 15, 2019Updated 6 years ago
- macOS Offensive Tools☆270Sep 28, 2023Updated 2 years ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,944Feb 28, 2025Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Jul 20, 2020Updated 5 years ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆341Apr 28, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- ☆99Feb 16, 2021Updated 5 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,548Mar 7, 2024Updated 2 years ago
- A collection of AWS penetration testing junk☆1,220Aug 30, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,089Aug 14, 2024Updated last year
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- Chameleon: A tool for evading Proxy categorisation☆512Nov 28, 2024Updated last year
- Find vulnerabilities in AD Group Policy☆641Mar 25, 2022Updated 3 years ago
- List of Awesome Asset Discovery Resources☆2,377Jan 22, 2025Updated last year
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- Convolutional neural network for analyzing pentest screenshots☆1,279Feb 19, 2024Updated 2 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- Search exposed EBS volumes for secrets☆302Apr 24, 2023Updated 2 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,623Dec 13, 2025Updated 2 months ago
- DeepSea Phishing Gear☆122Jul 20, 2020Updated 5 years ago
- Azure JWT Token Manipulation Toolset☆718Dec 6, 2024Updated last year
- Lockless allows for the copying of locked files.☆254Apr 30, 2021Updated 4 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Sep 17, 2024Updated last year