00xglitch / Bella
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. ππ»
β192Updated 2 years ago
Alternatives and similar repositories for Bella:
Users that are interested in Bella are comparing it to the libraries listed below
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.β280Updated last year
- A tool to generate obfuscated one liners to aid in penetration testingβ177Updated 6 years ago
- Parser for data dumps Collection #1 / Collection #2-5β144Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.β133Updated 5 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does noβ¦β246Updated last year
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red teβ¦β288Updated 3 months ago
- Office for Mac Macro Payload Generatorβ239Updated 7 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.β339Updated 3 years ago
- An automated Wireless RogueAP MITM attack framework.β181Updated 5 years ago
- Simple python backdoor with Ngrok tunnel supportβ203Updated last year
- Your Social Engineering Sidekickβ179Updated 2 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managedβ¦β207Updated 7 years ago
- Collect information about email addresses from Pastebinβ35Updated 3 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to heβ¦β404Updated 6 years ago
- Collection of social engineering payloadsβ295Updated 7 years ago
- IP obfuscator made to make a malicious ip a bit cuterβ544Updated 4 months ago
- Multiplatform payload dropperβ264Updated 3 years ago
- A list of private and public (more or less) blackhat boardsβ266Updated 5 years ago
- bettercap's web UIβ329Updated 3 months ago
- mosquito - Automating reconnaissance and brute force attacksβ129Updated 5 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Baβ¦β141Updated 5 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.β339Updated 7 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β332Updated 6 months ago
- Python / C# Unmanaged PowerShell based RATβ775Updated last year
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ284Updated 5 years ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation scriptβ197Updated 4 years ago
- πΊ Red Team Hardware Toolkit πΊβ322Updated 4 years ago
- APT34/OILRIG leakβ231Updated 5 years ago
- Empire client applicationβ491Updated 2 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control serverβ263Updated 7 years ago