MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vulnerable application.
☆17Oct 8, 2025Updated 5 months ago
Alternatives and similar repositories for MacInjector-Automated
Users that are interested in MacInjector-Automated are comparing it to the libraries listed below
Sorting:
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 9 months ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- PhantomsGate: Advanced Shellcode Injection Technique☆27Jul 15, 2024Updated last year
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- Unhook Ntdll.dll, Go & C++.☆33Apr 21, 2025Updated 10 months ago
- ☆65May 26, 2023Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆76May 19, 2024Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated 11 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆47Apr 7, 2025Updated 11 months ago
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 3 months ago
- ☆10Sep 24, 2021Updated 4 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 6 months ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 2 months ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- ☆10Mar 11, 2024Updated 2 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Bhadra is a Vulnerability Management Platform to handle all security issues☆16Mar 2, 2026Updated last week
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- My documented journey to learning fastapi☆11Apr 30, 2023Updated 2 years ago
- ☆14Feb 19, 2023Updated 3 years ago
- Advanced Windows authentication token extraction and decryption tool for red team operations and security research☆84Dec 30, 2025Updated 2 months ago
- ☆10Mar 6, 2023Updated 3 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- 模拟农场18 内购破解☆11Oct 23, 2020Updated 5 years ago
- IDA Terminal☆17Feb 27, 2026Updated 2 weeks ago
- ☆10Jul 8, 2024Updated last year
- Youtube channel sample code☆55Mar 7, 2026Updated last week
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆16Feb 27, 2026Updated 2 weeks ago
- ☆14Jun 27, 2022Updated 3 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- IDA plugin to Display Mach-O headers☆21Nov 4, 2011Updated 14 years ago
- Secure Federated Learning Framework with Encryption Aggregation and Integer Encoding Method.☆10Jul 1, 2024Updated last year