MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vulnerable application.
☆17Oct 8, 2025Updated 5 months ago
Alternatives and similar repositories for MacInjector-Automated
Users that are interested in MacInjector-Automated are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 9 months ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- PhantomsGate: Advanced Shellcode Injection Technique☆27Jul 15, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- ESPboy messenger with LORA module based on EBYTE solution. Up to 8km encrypted chat. Almost absolute privacy )☆23Jun 28, 2025Updated 9 months ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 3 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- Bhadra is a Vulnerability Management Platform to handle all security issues☆16Mar 2, 2026Updated last month
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆49Jan 22, 2025Updated last year
- Sniper. Passive Secrets Hunting.🚬☆13Jun 3, 2022Updated 3 years ago
- Crawlex is a powerful Chrome extension designed to assist bug bounty hunters in their work by enabling easy crawling of all possible URLs…☆12May 28, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Unhook Ntdll.dll, Go & C++.☆33Apr 21, 2025Updated 11 months ago
- Aftermath is a free macOS incident response framework☆34Sep 25, 2025Updated 6 months ago
- A Model Context Protocol server for Hopper Disassembler☆147Apr 13, 2025Updated 11 months ago
- A Python/Scapy based ARP Cache Poisoning tool.☆12Apr 3, 2016Updated 10 years ago
- Educational repository with source code examples☆12Jun 3, 2025Updated 9 months ago
- ☆13Jul 12, 2021Updated 4 years ago
- ☆19Sep 1, 2025Updated 7 months ago
- The Faction Burp Suite Extension☆13Mar 18, 2024Updated 2 years ago
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Scripts for Pentesting☆14May 29, 2025Updated 10 months ago
- Automation: Bash script wrapper to find and verify time base sql injection☆10Aug 25, 2022Updated 3 years ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Jul 26, 2022Updated 3 years ago
- Fetch & Filter Known URLs☆15Aug 3, 2022Updated 3 years ago
- Pentest automation resources for Burp☆15Mar 10, 2024Updated 2 years ago
- A POC reverse shell that can utilize multiple major web-browsers to provide remote access. Intended to demonstrate remote control of an e…☆13Dec 1, 2016Updated 9 years ago
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆158Nov 28, 2025Updated 4 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75May 19, 2024Updated last year
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆20Jun 26, 2024Updated last year
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- ☆18Sep 22, 2024Updated last year
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 9 years ago
- Qbot Source, Scanners, loaders....☆13Jul 2, 2023Updated 2 years ago