cedowens / Dylib_RunnerLinks
Swift code to run a dylib on disk
☆16Updated 3 years ago
Alternatives and similar repositories for Dylib_Runner
Users that are interested in Dylib_Runner are comparing it to the libraries listed below
Sorting:
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Updated 3 years ago
- ☆15Updated 4 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Updated 2 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- Golang Shlyuz Implant Implementation☆13Updated 6 months ago
- If you have any questions, please open an issue.☆25Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Updated last year
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Updated 4 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Updated 3 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated last year
- Firebase Domain Front Code☆21Updated 4 years ago
- ☆24Updated 4 years ago
- ☆15Updated 3 years ago
- ☆39Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆22Updated 2 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆43Updated 5 years ago
- ☆12Updated 3 years ago
- AMSI detection PoC☆31Updated 5 years ago
- PoC of macho loading from memory☆57Updated last year
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- ☆26Updated 4 years ago
- ☆24Updated 10 months ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Updated 2 years ago
- extracts shellcode from a nasm compile macho binary☆16Updated 4 years ago