kai5263499 / Bella
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. ππ»
β11Updated 8 years ago
Alternatives and similar repositories for Bella
Users that are interested in Bella are comparing it to the libraries listed below
Sorting:
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentationβ13Updated 2 years ago
- Python implementation of the SlowLoris DoS attack.β24Updated 8 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.comβ21Updated 10 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.β13Updated 3 years ago
- Recon-ng modules for basic OSINT.β11Updated 3 years ago
- Simple utility to manage multiple sshβ14Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ16Updated 5 years ago
- Standardizing Security Titlesβ13Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.β14Updated 5 months ago
- personal fork of OSINT tool recon-ngβ18Updated 7 years ago
- Random Tips and Writeups.β13Updated 6 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck frameworkβ12Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online maβ¦β13Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.β11Updated 4 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.β16Updated 6 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persistβ¦β32Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!β14Updated 4 years ago
- Just a better dirbusterβ12Updated 2 years ago
- Simple CLI utility to save off an image from every webcam hooked into a macβ14Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versionsβ14Updated 5 months ago
- macOS/OSX hash dump script taken from Empire frameworkβ13Updated 6 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, aβ¦β16Updated 2 years ago
- A proving grounds for young and aspiring BBOT modulesβ14Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting toolβ16Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ17Updated 4 years ago
- Monitor malware scanning services for your payloadsβ10Updated 3 years ago
- Kibana app for RedELKβ17Updated 2 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owensβ27Updated 4 years ago
- A 'trainer' agent which is great for showing customers a nice fake 'ransom' screen. Requires target machine to have head - since support β¦β11Updated last year
- Burp suite Certificate modification toolβ18Updated 2 years ago