fr4nk3nst1ner / slackattackLinks
Slack post-exploitation script for leaked bot tokens and "d" cookies
☆16Updated this week
Alternatives and similar repositories for slackattack
Users that are interested in slackattack are comparing it to the libraries listed below
Sorting:
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 4 months ago
- Nemesis agent for Mythic☆27Updated last year
- TypeScript/JavaScript client libraries for Sliver☆23Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆27Updated 2 years ago
- Mythic Scripting PyPi package - mythic☆26Updated last month
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Ansible role to deploy RedELK server☆18Updated 2 years ago
- ☆26Updated 4 years ago
- ☆39Updated 3 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Updated 4 years ago
- Caesar-Cipher based encryption☆31Updated 4 years ago
- HTML Smuggling with Web Assembly☆64Updated last year
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 3 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Updated 4 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Updated last year
- Some of my custom "tools".☆29Updated 3 years ago
- ☆18Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆49Updated 2 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆24Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- A standalone tool for logging shell commands to GhostWriter automatically☆19Updated last year
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- ☆39Updated 4 years ago