Collection of macOS persistence methods and miscellaneous tools in JXA
☆288Aug 3, 2023Updated 2 years ago
Alternatives and similar repositories for PersistentJXA
Users that are interested in PersistentJXA are comparing it to the libraries listed below
Sorting:
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆340Apr 28, 2022Updated 3 years ago
- macOS Initial Access Payload Generator☆324Jan 10, 2024Updated 2 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆192Nov 18, 2024Updated last year
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- macOS Offensive Tools☆270Sep 28, 2023Updated 2 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆82Feb 17, 2026Updated 2 weeks ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆109Oct 29, 2022Updated 3 years ago
- macOS persistence tool☆229Feb 9, 2022Updated 4 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆107Feb 19, 2022Updated 4 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆154Jul 12, 2023Updated 2 years ago
- Suite of tools to facilitate attacks against the Jamf macOS management platform.☆189Feb 10, 2021Updated 5 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- ☆15May 26, 2021Updated 4 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆188Mar 19, 2023Updated 2 years ago
- JavaScript for Automation (JXA) macOS agent☆92Feb 19, 2026Updated last week
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- PoC of macho loading from memory☆58Nov 18, 2024Updated last year
- A proof of concept for a clickjacking attack on macOS.☆97Feb 12, 2024Updated 2 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Objective C dylibHijackScanner and analysis tool☆40Jul 12, 2023Updated 2 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binar…☆98Sep 14, 2022Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- Quick and dirty dynamic redirect.rules generator☆170Oct 12, 2022Updated 3 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220May 3, 2023Updated 2 years ago
- Swift code to programmatically perform dylib injection☆52Oct 29, 2022Updated 3 years ago
- ☆99Feb 16, 2021Updated 5 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆170Aug 10, 2020Updated 5 years ago
- A .NET Framework 4.0 Windows Agent☆532Feb 20, 2026Updated last week
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆772Sep 4, 2024Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆425Jul 27, 2022Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆244Jul 14, 2021Updated 4 years ago
- Cobalt Strike Beacon Object Files☆167May 2, 2022Updated 3 years ago