All Projects → Bella → Similar Projects or Alternatives

749 Open source projects that are alternatives of or similar to Bella

Thoron
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-22.32%)
Mutual labels:  pentesting, post-exploitation
Dns Persist
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stars: ✭ 191 (+70.54%)
Mutual labels:  pentesting, post-exploitation
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+5915.18%)
Mutual labels:  pentesting, post-exploitation
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+48.21%)
Mutual labels:  pentesting, post-exploitation
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (+124.11%)
Mutual labels:  pentesting, post-exploitation
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+72.32%)
Mutual labels:  pentesting, post-exploitation
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+1530.36%)
Mutual labels:  pentesting, post-exploitation
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+259.82%)
Mutual labels:  pentesting, post-exploitation
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+1032.14%)
Mutual labels:  pentesting, post-exploitation
Enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (+49.11%)
Mutual labels:  pentesting, post-exploitation
Covertutils
A framework for Backdoor development!
Stars: ✭ 424 (+278.57%)
Mutual labels:  pentesting, post-exploitation
Gtfonow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-39.29%)
Mutual labels:  pentesting, post-exploitation
Swurg
Parse OpenAPI documents into Burp Suite for automating OpenAPI-based APIs security assessments (approved by PortSwigger for inclusion in their official BApp Store).
Stars: ✭ 94 (-16.07%)
Mutual labels:  pentesting
Go Deliver
Go-deliver is a payload delivery tool coded in Go.
Stars: ✭ 103 (-8.04%)
Mutual labels:  pentesting
Winpwn
Automation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+1063.39%)
Mutual labels:  pentesting
Katzkatz
Python3 script to parse txt files containing Mimikatz output
Stars: ✭ 91 (-18.75%)
Mutual labels:  pentesting
Webplotdigitizer
HTML5 based online tool to extract numerical data from plot images.
Stars: ✭ 1,605 (+1333.04%)
Mutual labels:  data-mining
Vailyn
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-8.04%)
Mutual labels:  pentesting
Acamar
A Python3 based single-file subdomain enumerator
Stars: ✭ 89 (-20.54%)
Mutual labels:  pentesting
Vvedenie Mashinnoe Obuchenie
📝 Подборка ресурсов по машинному обучению
Stars: ✭ 1,282 (+1044.64%)
Mutual labels:  data-mining
Burp Paramalyzer
Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.
Stars: ✭ 102 (-8.93%)
Mutual labels:  pentesting
Watf Bank
WaTF Bank - What a Terrible Failure Mobile Banking Application for Android and iOS
Stars: ✭ 87 (-22.32%)
Mutual labels:  pentesting
Blackrat
BlackRAT - Java Based Remote Administrator Tool
Stars: ✭ 87 (-22.32%)
Mutual labels:  pentesting
Embedos
EmbedOS - Embedded security testing virtual machine
Stars: ✭ 108 (-3.57%)
Mutual labels:  pentesting
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-6.25%)
Mutual labels:  pentesting
Hackvault
A container repository for my public web hacks!
Stars: ✭ 1,364 (+1117.86%)
Mutual labels:  pentesting
Git pentesting toolkit
Exploit pack for pentesters and ethical hackers.
Stars: ✭ 86 (-23.21%)
Mutual labels:  pentesting
Msnoise
A Python Package for Monitoring Seismic Velocity Changes using Ambient Seismic Noise | http://www.msnoise.org
Stars: ✭ 94 (-16.07%)
Mutual labels:  data-mining
Gspan
Python implementation of frequent subgraph mining algorithm gSpan. Directed graphs are supported.
Stars: ✭ 103 (-8.04%)
Mutual labels:  data-mining
Flask Unsign
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-19.64%)
Mutual labels:  pentesting
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-4.46%)
Mutual labels:  post-exploitation
Daggy
Daggy - Data Aggregation Utility. Open source, free, cross-platform, server-less, useful utility for remote or local data aggregation and streaming
Stars: ✭ 91 (-18.75%)
Mutual labels:  data-mining
Smtptester
small python3 tool to check common vulnerabilities in SMTP servers
Stars: ✭ 102 (-8.93%)
Mutual labels:  pentesting
Eyes.sh
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-20.54%)
Mutual labels:  pentesting
Awesome Malware
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-3.57%)
Mutual labels:  post-exploitation
Pentest Notes
Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
Stars: ✭ 89 (-20.54%)
Mutual labels:  pentesting
Gitlogg
💾 🧮 🤯 Parse the 'git log' of multiple repos to 'JSON'
Stars: ✭ 102 (-8.93%)
Mutual labels:  data-mining
Reverse Shell
Reverse Shell as a Service
Stars: ✭ 1,281 (+1043.75%)
Mutual labels:  pentesting
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-6.25%)
Mutual labels:  pentesting
Security Scripts
A collection of public offensive and defensive security related scripts for InfoSec students.
Stars: ✭ 101 (-9.82%)
Mutual labels:  pentesting
Atomic Red Team Intelligence C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Stars: ✭ 87 (-22.32%)
Mutual labels:  post-exploitation
Ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+1270.54%)
Mutual labels:  pentesting
Thecollective
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-24.11%)
Mutual labels:  pentesting
Vizuka
Explore high-dimensional datasets and how your algo handles specific regions.
Stars: ✭ 100 (-10.71%)
Mutual labels:  data-mining
2017 Jdd Global Data Explorer Competition
2017京东金融全球数据探索者大赛(3rd place)
Stars: ✭ 104 (-7.14%)
Mutual labels:  data-mining
Csmath 2020
This mathematics course is taught for the first year Ph.D. students of computer science and related areas @ZJU
Stars: ✭ 85 (-24.11%)
Mutual labels:  data-mining
Graph sampling
Graph Sampling is a python package containing various approaches which samples the original graph according to different sample sizes.
Stars: ✭ 99 (-11.61%)
Mutual labels:  data-mining
Zynix Fusion
zynix-Fusion is a framework that aims to centralize, standardizeand simplify the use of various security tools for pentest professionals.zynix-Fusion (old name: Linux evil toolkit) has few simple commands, one of which is theinit function that allows you to define a target, and thus use all the toolswithout typing anything else.
Stars: ✭ 84 (-25%)
Mutual labels:  pentesting
Dc Hi guides
[Data Castle 算法竞赛] 精品旅行服务成单预测 final rank 11
Stars: ✭ 83 (-25.89%)
Mutual labels:  data-mining
Papers Literature Ml Dl Rl Ai
Highly cited and useful papers related to machine learning, deep learning, AI, game theory, reinforcement learning
Stars: ✭ 1,341 (+1097.32%)
Mutual labels:  data-mining
Gitjacker
🔪 Leak git repositories from misconfigured websites
Stars: ✭ 1,249 (+1015.18%)
Mutual labels:  pentesting
Cloudfail
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (+1006.25%)
Mutual labels:  pentesting
Information Security Tasks
This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-3.57%)
Mutual labels:  pentesting
Subtake
Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.
Stars: ✭ 104 (-7.14%)
Mutual labels:  pentesting
Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-13.39%)
Mutual labels:  pentesting
Pentesting Cookbook
A set of recipes useful in pentesting and red teaming scenarios
Stars: ✭ 82 (-26.79%)
Mutual labels:  pentesting
Dex
Dex : The Data Explorer -- A data visualization tool written in Java/Groovy/JavaFX capable of powerful ETL and publishing web visualizations.
Stars: ✭ 1,238 (+1005.36%)
Mutual labels:  data-mining
Attacking Cloudgoat2
A step-by-step walkthrough of CloudGoat 2.0 scenarios.
Stars: ✭ 97 (-13.39%)
Mutual labels:  pentesting
Prismatica
Responsive Command and Control System
Stars: ✭ 81 (-27.68%)
Mutual labels:  pentesting
2017 Ccf Bdci Enterprise
2017-CCF-BDCI-企业经营退出风险预测:9th/569 (Top 1.58%)
Stars: ✭ 81 (-27.68%)
Mutual labels:  data-mining
1-60 of 749 similar projects