Send a Slack webhook when new Responder hashes are gathered.
This project allows pentesters to automatically receive a Slack webhook whenever a new hash is gathered with Responder. This is an especially effective tool when using a drop box for a remote external network. This tool can be configured to send only a notification instead of the full hash if such limitations exist.
- Responder (https://github.com/lgandx/Responder)
- Configured Slack App and webhook (https://slack.com/help/articles/115005265063-Incoming-webhooks-for-Slack)
- If utilizing the
sendCsv.pyutility, ensure the Slack app has the correct permissions set (https://api.slack.com/messaging/files/setup)
git clone https://github.com/m4lwhere/ResponderSlack.git
cd ResponderSlack
pip install -r requirements.txt
vim config.json
- Update
config.jsonwith your Slack webhook URL - Modify
ResponderDBinconfig.jsonif not stored in Kali default of/usr/share/responder/Responder.db - Modify
sendHashif notification only, and not to send the hash. By default, the full hash will be sent via webhook.
By default, the program will check every 60 seconds if a new hash was added to the database. This can be modified in the config.json file. Run the program in either a separate tmux pane or in the background.
python3 ./responderSlack.py
Contributors names and contact info
- 0.1
- Initial Release
This project is licensed under the Apache License - see the LICENSE.md file for details
