macOS persistence mechanism scanner with code signature verification and timeline tracking.
☆232Apr 28, 2026Updated last week
Alternatives and similar repositories for MacPersistenceChecker
Users that are interested in MacPersistenceChecker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated last month
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated last month
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 3 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆83Nov 6, 2025Updated 6 months ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆116Apr 22, 2026Updated 2 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated last month
- Open Source Implementation of Cobalt Strike's Malleable C2☆98Jan 27, 2026Updated 3 months ago
- ☆28Mar 14, 2026Updated last month
- This is practice VM for malware development☆180Nov 17, 2025Updated 5 months ago
- Azure apim mini proxy☆56Feb 16, 2026Updated 2 months ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated this week
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆23Apr 13, 2026Updated 3 weeks ago
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆563Oct 3, 2025Updated 7 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 5 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 5 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆67Feb 1, 2024Updated 2 years ago
- ☆153Mar 31, 2026Updated last month
- Sysmon Config Pusher - Modernized☆40Jan 7, 2026Updated 3 months ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆293Dec 6, 2025Updated 4 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆16Mar 23, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- "Service-less" driver loading☆186Nov 28, 2024Updated last year
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆74Oct 22, 2025Updated 6 months ago
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- ☆13Oct 27, 2020Updated 5 years ago
- ClickForClickOnce - Generate configurable clickonce payloads☆93Apr 17, 2026Updated 2 weeks ago
- ☆39Jul 31, 2025Updated 9 months ago
- fully async implementation of Dirkjan's ROADTools☆34Mar 15, 2025Updated last year
- Everything related to YARA☆16Apr 18, 2026Updated 2 weeks ago
- Forensic Analysis Tool for Btrfs File System.☆20Aug 6, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- A different approach to writing BOFs in rust.☆21Aug 20, 2025Updated 8 months ago
- A command line Curses based json viewer and tabulator☆30Aug 3, 2025Updated 9 months ago
- Simple root privilege escalation detection using eBPF 🐝☆35Feb 10, 2026Updated 2 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆129Feb 17, 2026Updated 2 months ago
- ☆85Feb 12, 2026Updated 2 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 9 months ago