ald3ns / XPR-dumpLinks
Helper scripts to automate the extraction of YARA rules from XProtectRemediators
☆21Updated last year
Alternatives and similar repositories for XPR-dump
Users that are interested in XPR-dump are comparing it to the libraries listed below
Sorting:
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆37Updated 2 months ago
- ☆51Updated last year
- Enumerate Location Services using CoreLocation API on macOS☆18Updated 3 years ago
- Discover which process execute a hunted binary inside macOS☆25Updated 3 years ago
- machofile is a module to parse Mach-O binary files☆88Updated last month
- Swift implementation of in-memory Mach-O loading on macOS☆63Updated 3 years ago
- Enumerate running processes using com.apple.CodeSigningHelper☆13Updated last year
- A minimal malware analysis sandbox for macOS☆31Updated 2 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Updated 4 years ago
- A simple macOS debugger detection trick☆15Updated 5 months ago
- ESF modular ingestion tool for development and research.☆36Updated 3 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Updated 2 years ago
- Swift code to run a dylib on disk☆16Updated 3 years ago
- A Ghidra extension for reverse-engineering macOS binaries.☆19Updated 8 months ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆80Updated 2 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆13Updated 3 years ago
- macOS Endpoint Security Message Analysis Tool☆47Updated 3 years ago
- ☆33Updated last year
- macOS Security Research☆119Updated last year
- ☆87Updated 11 months ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆45Updated 2 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆46Updated 4 months ago
- PoC of macho loading from memory☆57Updated 9 months ago
- ☆13Updated 2 years ago
- ☆15Updated 4 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆24Updated 3 years ago
- Swift code to programmatically perform dylib injection☆51Updated 2 years ago
- Python Library for ConfigExtractor☆12Updated 2 weeks ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Updated 3 years ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago