kai5263499 / Bella
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. ππ»
β11Updated 8 years ago
Alternatives and similar repositories for Bella:
Users that are interested in Bella are comparing it to the libraries listed below
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.comβ21Updated 10 years ago
- personal fork of OSINT tool recon-ngβ17Updated 7 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck frameworkβ12Updated 2 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoulβ¦β13Updated 8 years ago
- Standardizing Security Titlesβ13Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentationβ13Updated 2 years ago
- Recon-ng modules for basic OSINT.β11Updated 2 years ago
- β24Updated 2 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persistβ¦β31Updated 3 years ago
- Simple CLI utility to save off an image from every webcam hooked into a macβ14Updated 3 years ago
- Python implementation of the SlowLoris DoS attack.β23Updated 8 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.β59Updated 6 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types β¦β15Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ16Updated 4 years ago
- Simple utility to manage multiple sshβ14Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.β26Updated 5 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β19Updated 4 years ago
- Catalog Red Team techniques that cause popups in various macOS versionsβ14Updated 4 months ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online maβ¦β13Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.β14Updated 4 months ago
- A collection of my presentation materials.β16Updated 10 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!β14Updated 4 years ago
- SPIZZLE, The Onion Spider.β13Updated 7 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.β6Updated 11 years ago
- Exploit PoC for CVE's and non CVE's alikeβ22Updated 4 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requestsβ12Updated 9 months ago
- A number of exploits and tools I've written for CVEs accredited to Marshall Whittaker/oxagastβ6Updated last week
- Information Stealers Wall of Sheep (IS-WOS)β12Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deploymentsβ9Updated 7 years ago
- A collection of personal ZAP scriptsβ14Updated last year