fr4nk3nst1ner / slackattackLinks
Slack post-exploitation script for leaked bot tokens and "d" cookies
☆15Updated last month
Alternatives and similar repositories for slackattack
Users that are interested in slackattack are comparing it to the libraries listed below
Sorting:
- TypeScript/JavaScript client libraries for Sliver☆23Updated 2 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- HTML Smuggling with Web Assembly☆64Updated last year
- Nemesis agent for Mythic☆27Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 3 years ago
- Ansible role that Installs Mythic☆18Updated last year
- Firebase Domain Front Code☆21Updated 4 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 3 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆34Updated 4 years ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆50Updated 11 months ago
- Ansible role to deploy RedELK server☆18Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆27Updated 5 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- ☆26Updated 4 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆18Updated last year
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Updated 4 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆24Updated last year
- time-based user enum via Basic Auth in Azure against Autodiscover☆33Updated last year
- ☆15Updated 3 years ago
- Microsoft365 Device Code Phishing Framework☆38Updated 4 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 3 years ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 7 months ago
- Caesar-Cipher based encryption☆31Updated 4 years ago
- Python C2 with JScript Implant☆15Updated last year
- ☆15Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated last year