00xglitch / BellaLinks
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. ππ»
β195Updated 2 years ago
Alternatives and similar repositories for Bella
Users that are interested in Bella are comparing it to the libraries listed below
Sorting:
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.β279Updated last year
- Simple python backdoor with Ngrok tunnel supportβ204Updated last year
- mosquito - Automating reconnaissance and brute force attacksβ131Updated 5 years ago
- Parser for data dumps Collection #1 / Collection #2-5β146Updated 6 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.β134Updated 6 years ago
- Office for Mac Macro Payload Generatorβ241Updated 7 years ago
- Cloak can backdoor any python script with some tricks.β496Updated 6 years ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation scriptβ209Updated 4 years ago
- A tool to generate obfuscated one liners to aid in penetration testingβ179Updated 6 years ago
- Collect information about email addresses from Pastebinβ36Updated 4 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β331Updated 10 months ago
- Collection of social engineering payloadsβ296Updated 7 years ago
- transform your payload.exe into one fake word doc (.ppt)β468Updated 5 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red teβ¦β293Updated 7 months ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ286Updated 6 years ago
- Script to steal passwords from ssh.β483Updated 6 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to heβ¦β415Updated 6 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxiesβ140Updated 2 years ago
- My collection of metasploit auxiliary post-modulesβ191Updated 6 years ago
- Your Social Engineering Sidekickβ183Updated 2 years ago
- IP obfuscator made to make a malicious ip a bit cuterβ547Updated 8 months ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.β343Updated 4 years ago
- An automated Wireless RogueAP MITM attack framework.β187Updated 6 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distrosβ291Updated 7 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.β346Updated 3 years ago
- A list of private and public (more or less) blackhat boardsβ267Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β439Updated 7 years ago
- Python / C# Unmanaged PowerShell based RATβ777Updated 2 years ago
- unix SSH post-exploitation 1337 toolβ137Updated 6 years ago
- search for hosts info with shodanβ230Updated 4 years ago