fr4nk3nst1ner / slackattackLinks
Slack post-exploitation script for leaked bot tokens and "d" cookies
☆11Updated 3 months ago
Alternatives and similar repositories for slackattack
Users that are interested in slackattack are comparing it to the libraries listed below
Sorting:
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆30Updated this week
- Ansible role to deploy RedELK server☆18Updated last year
- ☆39Updated 2 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆71Updated 6 months ago
- Nemesis agent for Mythic☆27Updated 10 months ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- MimeCast Password Spraying Tool☆47Updated 5 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Configurable, Community driven, HTTP C2 Profile☆24Updated last month
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆24Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 8 months ago
- Obtain and parse SSL certificates☆10Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- ☆16Updated 10 months ago
- Firebase Domain Front Code☆21Updated 4 years ago
- Strategy for building a Red Team☆17Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated last year
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆12Updated 4 months ago
- HTML Smuggling with Web Assembly☆61Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆11Updated 4 months ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- ☆25Updated 3 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆17Updated 10 months ago