kai5263499 / Bella
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. ππ»
β11Updated 7 years ago
Related projects β
Alternatives and complementary repositories for Bella
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentationβ13Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck frameworkβ12Updated last year
- Data EXfiltration TestERβ21Updated 5 years ago
- Recon-ng modules for basic OSINT.β10Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ16Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online maβ¦β13Updated 3 years ago
- Kibana app for RedELKβ16Updated last year
- Host IDS for desktop usersβ11Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ15Updated 4 years ago
- Standardizing Security Titlesβ13Updated last year
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.β11Updated 4 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types β¦β13Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weirdβ22Updated 2 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owensβ26Updated 3 years ago
- A Fast & free Windows remote administration tool.β10Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking sessionβ10Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineeringβ14Updated 4 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networksβ14Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!β14Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.β14Updated last month
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ14Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individualβ12Updated 2 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwordsβ12Updated 4 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by attaβ¦β22Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β18Updated 4 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloadsβ13Updated 9 years ago
- β12Updated 2 years ago
- Free Email Providersβ10Updated last year
- Sp00fer blog post -β25Updated 2 years ago
- Burp suite Certificate modification toolβ17Updated last year