macOS persistence mechanism scanner with code signature verification and timeline tracking.
☆202Dec 20, 2025Updated 2 months ago
Alternatives and similar repositories for MacPersistenceChecker
Users that are interested in MacPersistenceChecker are comparing it to the libraries listed below
Sorting:
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated 3 weeks ago
- This is practice VM for malware development☆180Nov 17, 2025Updated 3 months ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Dec 20, 2025Updated 2 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆67Feb 5, 2026Updated 3 weeks ago
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Updated this week
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- ☆28Feb 11, 2026Updated 2 weeks ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆75Nov 6, 2025Updated 3 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆113Jan 25, 2026Updated last month
- Open Source Implementation of Cobalt Strike's Malleable C2☆94Jan 27, 2026Updated last month
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 3 months ago
- ☆140Aug 7, 2025Updated 6 months ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- Detect public repository dependencies in the GitHub repositories with an orphan required library.☆22Jun 24, 2025Updated 8 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆283Dec 6, 2025Updated 2 months ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated last week
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated last month
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆12May 23, 2024Updated last year
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Oct 22, 2025Updated 4 months ago
- Everything related to YARA☆16Feb 19, 2026Updated last week
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆168Jul 31, 2025Updated 7 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated 11 months ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Man-in-the-middle made easy!☆15Mar 25, 2020Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Feb 1, 2024Updated 2 years ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆224Apr 14, 2025Updated 10 months ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆501Oct 3, 2025Updated 4 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 8 months ago
- Elastic Security Labs' malware analysis and reverse engineering library☆51Feb 13, 2026Updated 2 weeks ago
- ☆16Oct 23, 2015Updated 10 years ago