CyborgSecurity / PoisonApple
macOS persistence tool
☆221Updated 3 years ago
Alternatives and similar repositories for PoisonApple:
Users that are interested in PoisonApple are comparing it to the libraries listed below
- macOS Offensive Tools☆265Updated last year
- macOS Initial Access Payload Generator☆299Updated last year
- Collection of macOS persistence methods and miscellaneous tools in JXA☆268Updated last year
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆106Updated 2 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆144Updated last year
- ☆99Updated 4 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆330Updated 2 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆119Updated 4 years ago
- Proxy Unix applications in the terminal☆113Updated 3 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆157Updated 2 months ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Swift 5 macOS agent☆102Updated 6 months ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆211Updated 2 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- d(ockerp)wn - a docker pwn tool manager☆155Updated 3 years ago
- lateral movement techniques that can be used during red team exercises☆269Updated 5 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆176Updated 2 years ago
- ☆162Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆165Updated last year
- Emulate and Dissect MSF and *other* attacks☆141Updated 11 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆253Updated 3 years ago
- easy-to-use payload hosting☆266Updated 2 years ago
- Apfell Golang macOS/Linux/Windows implant☆88Updated 3 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆224Updated 5 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆229Updated 4 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆120Updated 5 years ago
- A proof of concept for a clickjacking attack on macOS.☆94Updated last year
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago