MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vulnerable application.
☆17Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for MacInjector-Automated
Users that are interested in MacInjector-Automated are comparing it to the libraries listed below
Sorting:
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆26Jul 15, 2024Updated last year
- my own 2fa bypass methodolgy☆28Sep 22, 2023Updated 2 years ago
- Unhook Ntdll.dll, Go & C++.☆33Apr 21, 2025Updated 10 months ago
- ☆65May 26, 2023Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75May 19, 2024Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Mar 24, 2025Updated 11 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆42Apr 7, 2025Updated 10 months ago
- IDA Python scripts☆42Apr 11, 2025Updated 10 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Microsoft Network Service Fingerprinting Tool☆68Jan 2, 2026Updated last month
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- My documented journey to learning fastapi☆11Apr 30, 2023Updated 2 years ago
- ☆10Jul 8, 2024Updated last year
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆84Dec 30, 2025Updated 2 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- ☆14Feb 19, 2023Updated 3 years ago
- Bhadra is a Vulnerability Management Platform to handle all security issues☆16Sep 23, 2025Updated 5 months ago
- ☆10Mar 11, 2024Updated last year
- 模拟农场18 内购破解☆10Oct 23, 2020Updated 5 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- ☆10Mar 6, 2023Updated 2 years ago
- Youtube channel sample code☆55Feb 20, 2026Updated last week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- A tweak to inspect any application (user or system application). Inspect views, network, local variables, NSUserDefault and even more.☆13Aug 20, 2019Updated 6 years ago
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- Dockerized Ethereum testnets☆13Jun 3, 2018Updated 7 years ago
- 通过tweak注入动态库☆10Jan 15, 2025Updated last year
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- IDA command palette & more (Ctrl+Shift+P, Ctrl+P)☆24Feb 16, 2026Updated last week