CyborgSecurity / PoisonApple
macOS persistence tool
☆221Updated 2 years ago
Alternatives and similar repositories for PoisonApple:
Users that are interested in PoisonApple are comparing it to the libraries listed below
- macOS Offensive Tools☆265Updated last year
- macOS Initial Access Payload Generator☆295Updated last year
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆105Updated 2 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆265Updated last year
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆143Updated last year
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆329Updated 2 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆119Updated 4 years ago
- ☆99Updated 3 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆157Updated 2 months ago
- Swift 5 macOS agent☆101Updated 5 months ago
- A repository of previous info-sec presentations I've presented.☆158Updated 2 months ago
- Proxy Unix applications in the terminal☆113Updated 3 years ago
- List of Awesome macOS Red Teaming Resources.☆226Updated 2 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆162Updated last year
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆126Updated 6 months ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆139Updated 10 months ago
- d(ockerp)wn - a docker pwn tool manager☆155Updated 3 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆223Updated 4 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆215Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆164Updated 2 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆218Updated 5 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- ☆196Updated 3 months ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆175Updated 2 years ago
- easy-to-use payload hosting☆264Updated 2 years ago
- JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.☆150Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆127Updated last year