bashexplode / boko
Application Hijack Scanner for macOS
☆69Updated 3 years ago
Alternatives and similar repositories for boko:
Users that are interested in boko are comparing it to the libraries listed below
- Objective C dylibHijackScanner and analysis tool☆37Updated last year
- ☆19Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 3 years ago
- A sample POC for CVE-2021-30657 affecting MacOS☆31Updated 3 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆44Updated 2 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆43Updated last year
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 4 years ago
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- PoC CVE-2020-6308☆34Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 3 years ago
- ☆31Updated 3 years ago
- RCE in NPM VSCode Extension☆20Updated 3 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- A proof of concept for a clickjacking attack on macOS.☆94Updated last year
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 2 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆42Updated 4 years ago
- MacOS C2 Framework☆83Updated 3 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 5 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆31Updated 3 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 4 years ago
- CVE-2019-0230 Exploit POC☆15Updated 4 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆47Updated 3 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆26Updated 3 years ago
- ☆35Updated 2 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- collect☆17Updated 5 years ago