kai5263499 / Bella
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. ππ»
β11Updated 7 years ago
Related projects β
Alternatives and complementary repositories for Bella
- Standardizing Security Titlesβ13Updated last year
- Simple CLI utility to save off an image from every webcam hooked into a macβ14Updated 3 years ago
- Free Email Providersβ10Updated last year
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.comβ19Updated 10 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail orβ¦β18Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.β11Updated 4 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.β6Updated 11 years ago
- A collection of tools adversaries commonly use in an attack.β14Updated 2 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β18Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ16Updated 4 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest β¦β19Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deploymentsβ9Updated 7 years ago
- Machine Learning basics with phishing datasetβ10Updated 3 years ago
- Recon-ng modules for basic OSINT.β10Updated 2 years ago
- DNS logging, detection, ...β15Updated 2 years ago
- Simple utility to manage multiple sshβ14Updated 2 years ago
- Kibana app for RedELKβ16Updated last year
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.β34Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan β¦β50Updated 4 years ago
- personal fork of OSINT tool recon-ngβ16Updated 6 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ15Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits keyβ28Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Freeβ21Updated 5 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.β13Updated 6 years ago
- just manipulatin these here tokens yes sir nothing weirdβ22Updated 2 years ago
- A Fast & free Windows remote administration tool.β10Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by attaβ¦β22Updated 7 years ago
- Easily-guessable Password Generator for Password Spray Attackβ20Updated 4 years ago
- miscellaneous sploit scripts/hacksβ14Updated 4 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentationβ13Updated 2 years ago