CyborgSecurity / PoisonApple
macOS persistence tool
☆221Updated 2 years ago
Related projects: ⓘ
- macOS Initial Access Payload Generator☆280Updated 8 months ago
- macOS Offensive Tools☆258Updated 11 months ago
- ☆113Updated this week
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆103Updated last year
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆315Updated 2 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆260Updated last year
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆138Updated last year
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆114Updated 3 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆146Updated 3 years ago
- ☆99Updated 3 years ago
- Swift 5 macOS agent☆98Updated last month
- Proxy Unix applications in the terminal☆113Updated 3 years ago
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆118Updated 2 months ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆152Updated last year
- SonicWall SSL-VPN Exploit☆173Updated 3 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆205Updated 2 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆103Updated last year
- Emulate and Dissect MSF and *other* attacks☆137Updated 6 months ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆167Updated 3 years ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆300Updated 10 months ago
- A repository of previous info-sec presentations I've presented.☆150Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆219Updated 3 years ago
- ☆73Updated this week
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆174Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆295Updated last year
- HoneyCreds network credential injection to detect responder and other network poisoners.☆211Updated 2 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆217Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆105Updated 4 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆262Updated 4 months ago
- ☆161Updated last year