A pure python, post-exploitation, data mining tool and remote administration tool for macOS. ππ»
β11Feb 22, 2017Updated 9 years ago
Alternatives and similar repositories for Bella
Users that are interested in Bella are comparing it to the libraries listed below
Sorting:
- β15Jan 21, 2020Updated 6 years ago
- The Minary main GUI.β20Jan 29, 2021Updated 5 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.β52Jul 15, 2023Updated 2 years ago
- Tomcat backdoor based on CS blogβ29Jun 30, 2023Updated 2 years ago
- OSX Events Monitorβ22Sep 21, 2018Updated 7 years ago
- PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.β24Aug 28, 2025Updated 6 months ago
- Universal root exploit for the linux kernelβ38Apr 30, 2024Updated last year
- offensive security scripts and documentationβ30Dec 9, 2025Updated 2 months ago
- OSoMe API mashupsβ11Jan 29, 2019Updated 7 years ago
- Rust out-of-tree Linux Kernel Modules (LKMs) experimentation frameworkβ49Jul 17, 2023Updated 2 years ago
- β12Sep 10, 2019Updated 6 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"β14Dec 8, 2023Updated 2 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusionβ34Dec 19, 2024Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-factoβ¦β43Apr 23, 2024Updated last year
- A reddit scraping and analysis bot to visualize linguistic and content trendsβ11Oct 5, 2021Updated 4 years ago
- QuickLook text preview and icon thumbnailing app extensions for macOS Catalina and beyondβ17May 31, 2025Updated 9 months ago
- An SSH honeypot written entirely in Go.β12Dec 4, 2025Updated 3 months ago
- P2P Mesh C2 framework (C implants + Python server + Dashboard) for resilient redβteam opsβ12Aug 22, 2025Updated 6 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible formatβ14May 29, 2022Updated 3 years ago
- Fluxion is a easy to use wifi cracker, to test your own networkβ11Feb 8, 2017Updated 9 years ago
- One line command and control backdoors for APIs and web applications.β51Apr 9, 2024Updated last year
- Disassembly of Legend of Zelda Ocarina of Timeβ15Mar 25, 2018Updated 7 years ago
- Simple Signal K Node server plugin to read data from Victron devices using Instant Data over BLEβ16Nov 26, 2025Updated 3 months ago
- Persistent Certificate Store (PCeS) is a certificate lifecycle management system written in Go.β21Feb 10, 2026Updated 3 weeks ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.β12Aug 16, 2024Updated last year
- In accordance with survey reports, the growth of online business worldwide is significantly faster and higher in comparison with traditioβ¦β13Jul 30, 2023Updated 2 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!β12Feb 5, 2018Updated 8 years ago
- view RedFlagDeals.com from the command lineβ10Jul 6, 2024Updated last year
- β13Apr 2, 2023Updated 2 years ago
- Activities and examples for Machine Learning with Flogoβ14Dec 5, 2025Updated 3 months ago
- Bruteratelβ13Oct 26, 2022Updated 3 years ago
- Repo for transient training paper at ICAC 2019.β11Oct 5, 2022Updated 3 years ago
- Automate ISSG Tool Setupsβ13Nov 21, 2024Updated last year
- VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)β96Sep 1, 2023Updated 2 years ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systβ¦β51Mar 7, 2025Updated 11 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Scriptβ39Jul 11, 2019Updated 6 years ago
- Google Dorking Payloadsβ12Jun 24, 2024Updated last year
- a p2p socket proxy based on toxcoreβ12Jun 7, 2016Updated 9 years ago
- Dockerfilesβ11Nov 26, 2025Updated 3 months ago