D00MFist / PersistentJXALinks
Collection of macOS persistence methods and miscellaneous tools in JXA
☆280Updated last year
Alternatives and similar repositories for PersistentJXA
Users that are interested in PersistentJXA are comparing it to the libraries listed below
Sorting:
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆330Updated 3 years ago
- macOS Initial Access Payload Generator☆314Updated last year
- Tracking of offensive macOS tooling, blogs, and related helpful information☆177Updated 7 months ago
- macOS Offensive Tools☆270Updated last year
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆150Updated 2 years ago
- macOS persistence tool☆226Updated 3 years ago
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆108Updated 2 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆121Updated 4 years ago
- Swift 5 macOS agent☆106Updated 11 months ago
- ☆98Updated 4 years ago
- JavaScript for Automation (JXA) macOS agent☆85Updated last month
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆175Updated 2 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆79Updated 3 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆96Updated 10 months ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆104Updated 3 years ago
- ☆260Updated 2 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Updated 4 years ago
- ☆115Updated 3 months ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Updated 5 years ago
- A proof of concept for a clickjacking attack on macOS.☆95Updated last year
- Presentation material presented by Outflank team members at public events.☆188Updated 7 months ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆258Updated 3 years ago
- Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binar…☆97Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- Tools for discovery and abuse of COM hijacks☆322Updated 5 years ago
- Neutering Sysmon via driver unload☆230Updated 2 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- ☆474Updated 2 years ago