erran / keyjackerLinks
Keyjacker enumerates Mac keychains and displays plain text passwords.
☆23Updated 8 years ago
Alternatives and similar repositories for keyjacker
Users that are interested in keyjacker are comparing it to the libraries listed below
Sorting:
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- [⛔️ Deprecated] Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.☆177Updated 5 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆177Updated 5 years ago
- OSX Security Compliance & Hardening☆48Updated 10 years ago
- example project, utilizing Proc Info library☆70Updated 4 years ago
- New and Improved☆17Updated 9 years ago
- PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.☆30Updated 6 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- Baseline Security Configuration For MacOS☆66Updated 7 years ago
- Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format.☆105Updated 7 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- macOS Client-Side Phishing lock screen payload☆129Updated 6 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- Resources for HFS+ Forensics☆37Updated 9 years ago
- Materials from presentation☆20Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Research about malware that infects the EFI and SMC of Apple MacBooks.☆62Updated 6 months ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Leak File Analyzer☆62Updated 7 years ago
- Why hunt when you can seine?☆21Updated 10 years ago
- XProtect configuration files stats☆20Updated 7 years ago
- monitor macOS for malicious activity☆235Updated 8 months ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Parse the Mac Quickook index.sqlite database☆55Updated 9 years ago
- Configure Your Macbook For Blackhat☆176Updated 7 years ago
- experimenting w/ apple script for various macOS functionality☆14Updated 6 years ago
- sniff mouse and keyboard events☆223Updated 4 years ago