kai5263499 / Bella
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. ππ»
β11Updated 8 years ago
Alternatives and similar repositories for Bella:
Users that are interested in Bella are comparing it to the libraries listed below
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persistβ¦β31Updated 3 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoulβ¦β13Updated 8 years ago
- Simple CLI utility to save off an image from every webcam hooked into a macβ14Updated 3 years ago
- macOS/OSX hash dump script taken from Empire frameworkβ13Updated 6 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.β52Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versionsβ14Updated 3 months ago
- Recon-ng modules for basic OSINT.β11Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.β10Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentationβ13Updated 2 years ago
- Standardizing Security Titlesβ13Updated 2 years ago
- Python implementation of the SlowLoris DoS attack.β22Updated 7 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.β16Updated 6 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck frameworkβ12Updated 2 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.β36Updated last year
- Data EXfiltration TestERβ21Updated 5 years ago
- Phishing sites configured to work with Netlify form handlingβ12Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.β58Updated 6 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.comβ20Updated 10 years ago
- Some useful scripts for CobaltStrikeβ10Updated 6 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCPβ17Updated 2 months ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.β19Updated 2 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by attaβ¦β22Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β19Updated 4 years ago
- The best way to send emails in Go.β10Updated 4 years ago
- Simple utility to manage multiple sshβ14Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ16Updated 4 years ago
- Hunt and Analyze Tor Onion Sitesβ23Updated 2 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.β17Updated last year
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.β11Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ16Updated 4 years ago