Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
☆778Jan 31, 2025Updated last year
Alternatives and similar repositories for SlackPirate
Users that are interested in SlackPirate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Aug 12, 2025Updated 8 months ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆60Sep 2, 2021Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆115Feb 21, 2023Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆535Mar 7, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,063Jul 12, 2025Updated 9 months ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆249Oct 15, 2019Updated 6 years ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆84Oct 10, 2022Updated 3 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆342Apr 28, 2022Updated 3 years ago
- macOS Offensive Tools☆273Sep 28, 2023Updated 2 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,954Feb 28, 2025Updated last year
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,555Mar 7, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Payload designed for targeting Jamf enrolled devices.☆40May 19, 2023Updated 2 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆347Jul 20, 2020Updated 5 years ago
- Sustainable shellcode evasion☆113Mar 20, 2026Updated 3 weeks ago
- Electron based screenshot scanner☆67Feb 4, 2023Updated 3 years ago
- Convolutional neural network for analyzing pentest screenshots☆1,279Mar 8, 2026Updated last month
- macOS Initial Access Payload Generator☆322Jan 10, 2024Updated 2 years ago
- Chameleon: A tool for evading Proxy categorisation☆513Nov 28, 2024Updated last year
- ☆100Feb 16, 2021Updated 5 years ago
- A collection of AWS penetration testing junk☆1,224Aug 30, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Slack enumeration and exposed secrets detection tool☆400Updated this week
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- Reconnaissance tool for GitHub organizations☆6,159Sep 20, 2022Updated 3 years ago
- Find vulnerabilities in AD Group Policy☆640Mar 25, 2022Updated 4 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,172Aug 14, 2024Updated last year
- Credential Dumper☆80Feb 19, 2020Updated 6 years ago
- Search exposed EBS volumes for secrets☆301Apr 24, 2023Updated 2 years ago
- List of Awesome Asset Discovery Resources☆2,466Jan 22, 2025Updated last year
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Mar 13, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆817Oct 27, 2023Updated 2 years ago
- A utility to convert your AWS CLI credentials into AWS console access.☆259May 7, 2020Updated 5 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago