SentineLabs / aevt_decompile
This is a work-in-progress command line tool for reversing run-only AppleScripts. It will help parse the output of applescript-disassembler.py into something more human-readable.
☆66Updated 4 years ago
Alternatives and similar repositories for aevt_decompile:
Users that are interested in aevt_decompile are comparing it to the libraries listed below
- A simple run-only applescript disassembler☆119Updated 3 years ago
- macOS Endpoint Security Message Analysis Tool☆47Updated 3 years ago
- Phorion Kronos is a macOS security tool designed to enhance Apple's Transparency Consent and Control (TCC) security and privacy mechanism…☆74Updated last year
- An app to protect against process injection and suspicious file links on macOS☆220Updated 3 years ago
- App sandbox escapes for macOS☆28Updated 4 years ago
- Scan your computer for applications that are either susceptible to dylib hijacking or have been hijacked.☆91Updated last year
- View all modules on that are loaded in the OS kernel☆74Updated 2 years ago
- macOS Security Research☆116Updated last year
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆78Updated last year
- macOS Sandbox Profile Language (SBPL) Interpreter☆53Updated 4 years ago
- macOS XProtect definition files☆40Updated 3 years ago
- Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binar…☆96Updated 2 years ago
- A parsing tool for backgrounditems.btm☆48Updated 7 months ago
- Research about malware that infects the EFI and SMC of Apple MacBooks.☆57Updated last week
- Mapping XProtect's obfuscated malware family names to common industry names.☆84Updated 11 months ago
- Scripts for Hopper Disassembler☆48Updated 9 months ago
- Secure example of an XPC helper written in Swift☆107Updated 5 years ago
- Examples of programmatically interacting with ioreg and sysctl to query system info☆10Updated 2 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆39Updated 3 years ago
- Ghidra CI/CD to build and host a universal macOS Ghidra.app☆37Updated last month
- ESF modular ingestion tool for development and research.☆35Updated 3 years ago
- Hopper plugin to analyze ObjC runtime structures in the dyld_shared_cache☆24Updated 4 years ago
- Discover which process execute a hunted binary inside macOS☆24Updated 3 years ago
- Grant private entitlements to OSX apps☆107Updated 4 years ago
- A module to expose the Endpoint Security library to Swift☆20Updated 5 years ago
- OSX Events Monitor☆22Updated 6 years ago
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆30Updated 3 months ago
- CVE-2020-9992 - A design flaw in MobileDevice.framework/Xcode and iOS/iPadOS/tvOS Development Tools allows an attacker in the same networ…☆66Updated 4 years ago
- macOS notes☆118Updated 5 years ago
- machofile is a module to parse Mach-O binary files☆51Updated last year