CyborgSecurity / PoisonAppleLinks
macOS persistence tool
☆225Updated 3 years ago
Alternatives and similar repositories for PoisonApple
Users that are interested in PoisonApple are comparing it to the libraries listed below
Sorting:
- macOS Offensive Tools☆268Updated last year
- macOS Initial Access Payload Generator☆307Updated last year
- Collection of macOS persistence methods and miscellaneous tools in JXA☆277Updated last year
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆107Updated 2 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆150Updated last year
- ☆98Updated 4 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆328Updated 3 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆121Updated 4 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆173Updated 6 months ago
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 7 months ago
- Emulate and Dissect MSF and *other* attacks☆141Updated last year
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆120Updated 5 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆377Updated 3 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆215Updated 2 years ago
- Swift 5 macOS agent☆106Updated 10 months ago
- SonicWall SSL-VPN Exploit☆176Updated 4 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 7 months ago
- List of Awesome macOS Red Teaming Resources.☆232Updated 3 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- d(ockerp)wn - a docker pwn tool manager☆157Updated 3 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆203Updated 2 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆178Updated 2 years ago
- easy-to-use payload hosting☆270Updated 3 years ago