kai5263499 / Bella
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻
☆11Updated 7 years ago
Alternatives and similar repositories for Bella:
Users that are interested in Bella are comparing it to the libraries listed below
- Python implementation of the SlowLoris DoS attack.☆22Updated 7 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14Updated 3 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated last month
- Some useful scripts for CobaltStrike☆10Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆26Updated 4 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Burp suite Certificate modification tool☆18Updated last year
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Extract root domain, subdomain name, and tld from a url, using the Public Suffix List.☆8Updated 2 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 9 months ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 2 months ago
- Web based favicon recon tool made using streamlit.☆10Updated 2 years ago
- DNS logging, detection, ...☆15Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago