daem0nc0re / macOS_ARM64_Shellcode
ARM64 macOS assembly program for null-byte free shellcode
☆99Updated last month
Alternatives and similar repositories for macOS_ARM64_Shellcode:
Users that are interested in macOS_ARM64_Shellcode are comparing it to the libraries listed below
- CVE-2022-22639: Get a Root Shell on macOS Monterey☆120Updated 2 years ago
- ☆98Updated last year
- A Reflective Loader for macOS☆95Updated last month
- macOS Security Research☆114Updated 10 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- Collection of materials relating to FORCEDENTRY☆95Updated 10 months ago
- ☆115Updated 9 months ago
- PoC of macho loading from memory☆53Updated 2 months ago
- ☆56Updated 2 years ago
- ☆69Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆112Updated 8 months ago
- ☆112Updated 5 months ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- Escape macOS Sandbox using sharedfilelistd exploit☆55Updated 3 weeks ago
- ☆45Updated 6 months ago
- ☆34Updated 8 months ago
- ☆48Updated 4 years ago
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆45Updated 3 years ago
- A general purpose toolkit to make vulnerability research on macOS easier.☆74Updated 2 weeks ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆43Updated 2 years ago
- CodeQL + DTrace = Memory Disclosure Vulnerabilities in XNU☆45Updated last year
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆43Updated 2 years ago
- ☆73Updated 2 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆145Updated 2 years ago
- ☆78Updated 5 months ago
- ☆153Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆124Updated 2 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆42Updated last year
- Swift code to programmatically perform dylib injection☆50Updated 2 years ago