CyborgSecurity / PoisonAppleLinks
macOS persistence tool
☆229Updated 3 years ago
Alternatives and similar repositories for PoisonApple
Users that are interested in PoisonApple are comparing it to the libraries listed below
Sorting:
- macOS Offensive Tools☆271Updated 2 years ago
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆109Updated 3 years ago
- macOS Initial Access Payload Generator☆321Updated 2 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆123Updated 5 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆151Updated 2 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆341Updated 3 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆285Updated 2 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆190Updated last year
- ☆99Updated 4 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Proxy Unix applications in the terminal☆116Updated 4 years ago
- A repository of previous info-sec presentations I've presented.☆163Updated last year
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 5 years ago
- A proof of concept for a clickjacking attack on macOS.☆96Updated last year
- Swift 5 macOS agent☆113Updated last year
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Updated 5 years ago
- Application Hijack Scanner for macOS☆71Updated 4 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Updated 3 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆139Updated last year
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆124Updated 3 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated 5 months ago
- Emulate and Dissect MSF and *other* attacks☆142Updated last year
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆128Updated last year
- ☆79Updated 3 months ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆97Updated last year
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆181Updated 2 years ago
- List of Awesome macOS Red Teaming Resources.☆241Updated 3 years ago
- Slack C2bot that executes commands and returns the output.☆47Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 6 years ago