kai5263499 / BellaLinks
A pure python, post-exploitation, data mining tool and remote administration tool for macOS. ππ»
β11Updated 8 years ago
Alternatives and similar repositories for Bella
Users that are interested in Bella are comparing it to the libraries listed below
Sorting:
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.β13Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.β14Updated last year
- Python implementation of the SlowLoris DoS attack.β24Updated 8 years ago
- A web front-end for password cracking and analyticsβ16Updated 6 years ago
- Standardizing Security Titlesβ13Updated 2 years ago
- personal fork of OSINT tool recon-ngβ18Updated 7 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentialsβ54Updated 2 years ago
- Simple CLI utility to save off an image from every webcam hooked into a macβ14Updated 4 years ago
- Man in the Browser Frameworkβ50Updated 11 months ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.β35Updated 2 years ago
- Free Email Providersβ11Updated 2 years ago
- Catalog Red Team techniques that cause popups in various macOS versionsβ15Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan β¦β53Updated 5 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find humanβ¦β29Updated 7 years ago
- Legba recipes.β51Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting toolβ17Updated 3 years ago
- A proving grounds for young and aspiring BBOT modulesβ15Updated 3 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific eventsβ30Updated 4 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owensβ28Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.β25Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps orgβ¦β22Updated 2 years ago
- buffer overflow examplesβ22Updated 7 years ago
- Malware campaigns and APTs research by BlackArrowβ19Updated 5 years ago
- bash script to prepare Debian machines for OSINT useβ12Updated 5 years ago
- wordlists for password crackingβ28Updated 3 years ago
- DNS logging, detection, ...β15Updated 3 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.β62Updated 7 years ago
- Pure Honeypots with an automated bash scriptβ20Updated 4 years ago
- a collection of profiles for macOS designed for penetration testing or red teamingβ36Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)β12Updated 3 years ago