cedowens / EntitlementCheckLinks
Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binaries with problematic/interesting entitlements. Also checks for hardened runtime enablement
☆98Updated 3 years ago
Alternatives and similar repositories for EntitlementCheck
Users that are interested in EntitlementCheck are comparing it to the libraries listed below
Sorting:
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Updated 3 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Updated 4 years ago
- https://wojciechregula.blog/post/macos-red-teaming-get-ad-credentials-from-nomad/☆43Updated 3 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Updated 4 years ago
- Phorion Kronos is a macOS security tool designed to enhance Apple's Transparency Consent and Control (TCC) security and privacy mechanism…☆79Updated 2 years ago
- Swift code to programmatically perform dylib injection☆52Updated 3 years ago
- A library to parse macOS LoginItems☆18Updated 3 years ago
- ESF modular ingestion tool for development and research.☆37Updated 4 years ago
- macOS Endpoint Security Message Analysis Tool☆47Updated 4 years ago
- Swift 5 macOS agent☆113Updated last year
- Swift Command line tool used for proactive detection of malicious activity on macOS systems.☆67Updated 5 years ago
- ☆56Updated last year
- ☆33Updated last year
- JXA situational awareness helper by simply reading specific files on a filesystem☆82Updated 3 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Updated 2 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Updated 3 years ago
- Payload designed for targeting Jamf enrolled devices.☆39Updated 2 years ago
- machofile is a module to parse Mach-O binary files☆90Updated this week
- Discover which process execute a hunted binary inside macOS☆27Updated 4 years ago
- Mapping XProtect's obfuscated malware family names to common industry names.☆92Updated 2 months ago
- Execute MachO binaries in memory using CGo☆79Updated 4 years ago
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆38Updated 7 months ago
- Golang Tool to interact with Launchd and other services with XPC☆29Updated 5 years ago
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆109Updated 3 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆341Updated 3 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Updated 4 years ago
- macOS Security Research☆121Updated last year
- Tracking of offensive macOS tooling, blogs, and related helpful information☆192Updated last year
- An app to protect against process injection and suspicious file links on macOS☆230Updated 4 years ago
- A proof of concept for a clickjacking attack on macOS.☆96Updated last year