kai5263499 / BellaLinks
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. ππ»
β11Updated 8 years ago
Alternatives and similar repositories for Bella
Users that are interested in Bella are comparing it to the libraries listed below
Sorting:
- Python implementation of the SlowLoris DoS attack.β24Updated 8 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentialsβ54Updated 2 years ago
- Simple CLI utility to save off an image from every webcam hooked into a macβ14Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.β13Updated 4 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.β15Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.β14Updated 10 months ago
- Convert MacOS plist password file to hash file for password crackersβ37Updated 6 years ago
- a collection of profiles for macOS designed for penetration testing or red teamingβ34Updated 6 years ago
- Catalog Red Team techniques that cause popups in various macOS versionsβ15Updated 10 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ17Updated 5 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoulβ¦β13Updated 9 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific eventsβ30Updated 4 years ago
- Standardizing Security Titlesβ13Updated 2 years ago
- Some useful scripts for CobaltStrikeβ11Updated 6 years ago
- Man in the Browser Frameworkβ50Updated 8 months ago
- bash script to prepare Debian machines for OSINT useβ12Updated 5 years ago
- A web front-end for password cracking and analyticsβ16Updated 6 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.comβ22Updated 11 years ago
- Recon-ng modules for basic OSINT.β11Updated 3 years ago
- Legba recipes.β50Updated last year
- Free Email Providersβ11Updated 2 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.β28Updated 2 months ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail orβ¦β19Updated 8 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owensβ27Updated 4 years ago
- Just a better dirbusterβ13Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.β62Updated 7 years ago
- A repository for maintaining a list of the top domains based on multiple listsβ22Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β20Updated 4 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.β18Updated 5 years ago
- Malware campaigns and APTs research by BlackArrowβ18Updated 5 years ago