fr4nk3nst1ner / slackattackLinks
Slack post-exploitation script for leaked bot tokens and "d" cookies
☆11Updated 2 months ago
Alternatives and similar repositories for slackattack
Users that are interested in slackattack are comparing it to the libraries listed below
Sorting:
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Obtain and parse SSL certificates☆10Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆12Updated 3 months ago
- Strategy for building a Red Team☆17Updated last year
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated 2 months ago
- TypeScript/JavaScript client libraries for Sliver☆20Updated 2 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 4 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆24Updated 4 years ago
- Ansible role to deploy RedELK server☆18Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆11Updated 3 months ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- ☆39Updated 2 years ago
- Nemesis agent for Mythic☆27Updated 9 months ago
- ☆16Updated 8 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 7 months ago
- ☆18Updated last year
- ☆35Updated 3 months ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- Golang Implementation of Hell's gate☆17Updated 2 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Simple reverse ICMP shell☆14Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 3 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 11 months ago
- ☆17Updated 7 months ago