00xglitch / Bella
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. ππ»
β194Updated 2 years ago
Alternatives and similar repositories for Bella:
Users that are interested in Bella are comparing it to the libraries listed below
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.β280Updated last year
- transform your payload.exe into one fake word doc (.ppt)β468Updated 5 years ago
- A tool to generate obfuscated one liners to aid in penetration testingβ178Updated 6 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β333Updated 9 months ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation scriptβ206Updated 4 years ago
- Office for Mac Macro Payload Generatorβ241Updated 7 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to heβ¦β412Updated 6 years ago
- IP obfuscator made to make a malicious ip a bit cuterβ545Updated 6 months ago
- mosquito - Automating reconnaissance and brute force attacksβ130Updated 5 years ago
- Collect information about email addresses from Pastebinβ35Updated 3 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.β345Updated 7 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red teβ¦β290Updated 6 months ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.β175Updated 4 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C serverβ500Updated 5 years ago
- Cloak can backdoor any python script with some tricks.β493Updated 6 years ago
- An automated Wireless RogueAP MITM attack framework.β185Updated 6 years ago
- macOS Client-Side Phishing lock screen payloadβ128Updated 6 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.β342Updated 4 years ago
- Simple python backdoor with Ngrok tunnel supportβ204Updated last year
- A list of private and public (more or less) blackhat boardsβ268Updated 6 years ago
- Parser for data dumps Collection #1 / Collection #2-5β146Updated 6 years ago
- macOS Privilege Escalation Helperβ142Updated 2 months ago
- Python / C# Unmanaged PowerShell based RATβ777Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β439Updated 7 years ago
- Multiplatform payload dropperβ272Updated 3 years ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ286Updated 5 years ago
- Collection of social engineering payloadsβ297Updated 7 years ago
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxiesβ139Updated 2 years ago
- unix SSH post-exploitation 1337 toolβ137Updated 6 years ago
- information gathering via dorksβ384Updated 3 years ago