Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.
☆49Oct 6, 2021Updated 4 years ago
Alternatives and similar repositories for macOS-Exploit-Dev-OSMR
Users that are interested in macOS-Exploit-Dev-OSMR are comparing it to the libraries listed below
Sorting:
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Sep 22, 2021Updated 4 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆48Jun 8, 2020Updated 5 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆25Jun 29, 2021Updated 4 years ago
- ☆197Feb 14, 2024Updated 2 years ago
- List of Google dorks to find VDPs and Bug Bounty Programs☆33Jan 3, 2023Updated 3 years ago
- libflutter.so(s) modified for traffic intercepting removing certificate pinning validation. Dart version is 2.10.5☆12Jul 11, 2021Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Resources and writeups for studying & practicing iOS security☆64Oct 16, 2021Updated 4 years ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- Rust implementation of SafePOSIX☆13May 13, 2025Updated 10 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- List of Awesome macOS Red Teaming Resources.☆243Apr 15, 2022Updated 3 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆83Jun 25, 2021Updated 4 years ago
- Welcome to the Lind sandbox monorepo! See our docs below:☆19Mar 13, 2026Updated last week
- ☆17Sep 29, 2023Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- Extracted lua script from Defender mpavbase.vdm and mpasbase.vdm☆16Jul 5, 2024Updated last year
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Mar 13, 2024Updated 2 years ago
- ☆34Aug 7, 2023Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆72Aug 31, 2023Updated 2 years ago
- ☆44Mar 16, 2024Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆36Mar 11, 2026Updated last week
- Rust bindings to Microsoft Windows users / groups management API☆34Dec 27, 2025Updated 2 months ago
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- iettnext: ai-backed, next-generation mobile application for istanbul's transport☆30Jan 22, 2026Updated last month
- Lightweight Cryptographic Framework for Internet of Drones☆19Sep 29, 2018Updated 7 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Mar 3, 2022Updated 4 years ago
- A curated list of resources for the OSED journey.☆72Feb 3, 2022Updated 4 years ago
- ☆51Feb 14, 2026Updated last month
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- ☆50Mar 21, 2019Updated 7 years ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- A Model Context Protocol server for IDA☆27Mar 25, 2025Updated 11 months ago
- ☆25Jul 7, 2022Updated 3 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago