kai5263499 / BellaLinks
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻
☆11Updated 8 years ago
Alternatives and similar repositories for Bella
Users that are interested in Bella are comparing it to the libraries listed below
Sorting:
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated 2 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- Man in the Browser Framework☆50Updated 8 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated 9 months ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14Updated 4 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆27Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Updated 11 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Scripts and tool for iOS app reversing☆27Updated 3 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- A proving grounds for young and aspiring BBOT modules☆14Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last month
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 10 months ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Free Email Providers☆11Updated 2 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 9 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago