erran / keyjackerLinks
Keyjacker enumerates Mac keychains and displays plain text passwords.
☆23Updated 7 years ago
Alternatives and similar repositories for keyjacker
Users that are interested in keyjacker are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- New and Improved☆17Updated 9 years ago
- OSX Security Compliance & Hardening☆48Updated 10 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.☆30Updated 6 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆176Updated 5 years ago
- experimenting w/ apple script for various macOS functionality☆14Updated 6 years ago
- Dump the iOS Frequent Location binary plist files☆85Updated 6 years ago
- ☆58Updated 10 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- apbleed☆24Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- SlyPI☆20Updated 12 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format.☆105Updated 7 years ago
- Next Generation of White Chapel☆21Updated 10 years ago