CyborgSecurity / PoisonAppleLinks
macOS persistence tool
☆226Updated 3 years ago
Alternatives and similar repositories for PoisonApple
Users that are interested in PoisonApple are comparing it to the libraries listed below
Sorting:
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆108Updated 2 years ago
- macOS Offensive Tools☆270Updated last year
- Tracking of offensive macOS tooling, blogs, and related helpful information☆179Updated 8 months ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆121Updated 4 years ago
- macOS Initial Access Payload Generator☆316Updated last year
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆331Updated 3 years ago
- ☆98Updated 4 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆281Updated 2 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆151Updated 2 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- Swift 5 macOS agent☆107Updated last year
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆143Updated last year
- A proof of concept for a clickjacking attack on macOS.☆95Updated last year
- Execute MachO binaries in memory using CGo☆81Updated 4 years ago
- ☆80Updated 3 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆180Updated 2 years ago
- Application Hijack Scanner for macOS☆71Updated 3 years ago
- easy-to-use payload hosting☆270Updated 3 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- List of Awesome macOS Red Teaming Resources.☆235Updated 3 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆222Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 5 years ago
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 5 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 4 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆121Updated 5 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆217Updated 2 years ago