Slackhound

Recon

Reconnaissance tool for Slack workspaces, allowing red teams to quickly search user profiles, files, and other objects.

Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, locations, files, and other objects.

GitHub

74 stars
3 watching
7 forks
Language: Python
last commit: 9 months ago

Related projects:

Repository Description Stars
rusty-ferris-club/recon Reconnaissance tool for searching and querying files on a host for security experts 31
plumhound/plumhound An Active Directory vulnerability reporting tool using BloodHoundAD's graph-based query engine 1,121
dblock/slack-sup Generates triads of team members to meet in informal standups 19
s0md3v/recondog An all-in-one reconnaissance tool for gathering information about web targets 1,814
slack-ruby/slack-shellbot An implementation of a Slack channel with a rudimentary file system using Ruby and bot events. 26
pathetiq/burpsmartbuster A Burp Suite plugin that automatically adds smart discovery features to brute force attacks 383
bohops/rogueassemblyhunter A utility for discovering and identifying malicious .NET modules in running processes. 115
lisprez/so_stupid_search A fast and minimalistic tool for searching strings deeply within directory structures recursively. 162
bloodhoundad/bloodhound-tools Tools and utilities to support the BloodHound threat hunting framework 377
slack-ruby/slack-ruby-bot A Ruby framework for building Slack bots with minimal overhead and maximum flexibility. 1,120
hypnoze57/sharphound4cobalt A tool for collecting and reporting network activity data to Cobalt Strike. 46
danmcinerney/fast-recon Automates the process of searching for sensitive files using Google dorks on a given domain 159
mackittipat/slothsandra A Slack bot that stores public chat messages in Apache Cassandra for querying and lookup purposes. 0
dblock/slack-gamebot A Slack-based bot for playing various games and tracking user interactions 129
buffer/thug A tool designed to mimic the behavior of a user-driven network client application to detect and study malicious content. 994