Bella
Mac OS Exploit Tool
A post-exploitation tool designed to facilitate remote administration and data mining on macOS systems.
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
183 stars
7 watching
48 forks
Language: Python
last commit: about 2 years ago
Linked from 2 awesome lists
data-miningmacospentestingpost-exploitationremote-administrator-tool
Related projects:
Repository | Description | Stars |
---|---|---|
emilyanncr/windows-post-exploitation | Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing | 524 |
belane/linux-soft-exploit-suggester | A script to identify vulnerabilities in software packages on Linux systems | 222 |
ydkhatri/mac_apt | A digital forensics tool for analyzing macOS and iOS systems | 783 |
xtiankisutsa/mara_framework | An all-in-one toolkit to analyze and test mobile applications for security vulnerabilities | 630 |
sslab-gatech/pwn2own2020 | An exploitation project demonstrating how to chain vulnerabilities in Safari to escalate privilege on macOS | 402 |
theori-io/zer0con2018_singi | An exploit demonstrating code execution vulnerabilities in macOS Sierra using Safari and WindowServer | 121 |
byt3bl33d3r/silenttrinity | An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. | 2,196 |
buffalowill/oxml_xxe | A tool for exploiting XXE vulnerabilities in various file formats | 1,038 |
jbarone/xxelab | A proof-of-concept web application demonstrating an XML External Entity vulnerability | 225 |
enjoiz/xxeinjector | Automates exploitation of XXE vulnerability using various methods to retrieve files and data from vulnerable applications. | 1,542 |
manasecurity/mana-security-app | Automated vulnerability scanning and management tool for macOS applications. | 25 |
brompwnie/botb | A tool designed to analyze and exploit vulnerabilities in containers for pentesters and engineers | 638 |
andresriancho/nimbostratus | Tools to discover vulnerabilities in Amazon cloud infrastructure | 447 |
abatchy17/windowsexploits | A collection of precompiled Windows exploit binaries | 1,831 |
rednaga/apkid | Identifies how Android apps were made by analyzing compiled code and file formats | 2,070 |