AlfredoAbarca / OSXMon
OSX Events Monitor
☆22Updated 6 years ago
Alternatives and similar repositories for OSXMon:
Users that are interested in OSXMon are comparing it to the libraries listed below
- macOS XProtect definition files☆40Updated 2 years ago
- example project, utilizing Proc Info library☆68Updated 4 years ago
- macOS application that makes use of the EndpointSecurity framework☆19Updated 5 years ago
- A module to expose the Endpoint Security library to Swift☆20Updated 5 years ago
- A minimal malware analysis sandbox for macOS☆28Updated 2 years ago
- XProtect configuration files stats☆20Updated 7 years ago
- ☆33Updated 12 years ago
- ☆31Updated 8 months ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆38Updated 3 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Updated 9 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 5 years ago
- The current repository contains all the scripts needed to build kernel-mode mac-a-mal malicious activity hooking on macOS.☆84Updated 6 years ago
- Tools to measure an app's App Sandbox usage☆24Updated 4 years ago
- Research about malware that infects the EFI and SMC of Apple MacBooks.☆57Updated 11 months ago
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆74Updated 11 months ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Updated 5 years ago
- Parse the Mac Quickook index.sqlite database☆53Updated 8 years ago
- This is a work-in-progress command line tool for reversing run-only AppleScripts. It will help parse the output of applescript-disassembl…☆65Updated 4 years ago
- This is a malware analyzer for Mac OS X that extends the Cuckoo Sandbox project (https://cuckoosandbox.org/)☆21Updated 8 years ago
- Discover which process execute a hunted binary inside macOS☆24Updated 3 years ago
- Python Module for parsing Apple ASL Logs☆14Updated 8 years ago
- A Kext that can be used to disable Rootless in OS X El Capitan/macOS Sierra. You need to sign it OR use an exploit to make OS X load it.☆78Updated 4 years ago
- ☆62Updated 7 years ago
- Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format.☆102Updated 6 years ago
- Notifies the user when macOS Security components like Gatekeeper and XProtect have been updated☆60Updated 3 years ago
- Objective-See's Products☆13Updated 9 years ago
- The grey fox☆25Updated 8 years ago
- Swift Command line tool used for proactive detection of malicious activity on macOS systems.☆68Updated 4 years ago
- Slides and material from my conference presentations☆15Updated 10 months ago
- View all modules on that are loaded in the OS kernel☆69Updated 2 years ago