gdbinit / av-monster
PoC kext to disable OS X anti-virus software
☆15Updated 13 years ago
Alternatives and similar repositories for av-monster:
Users that are interested in av-monster are comparing it to the libraries listed below
- OS X rootkit loader version #2☆12Updated 9 years ago
- OS X rootkit loader version #1☆18Updated 9 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Updated 9 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- Runtime code injection suite for exploring OS X process security☆37Updated 15 years ago
- small utility to dump kernel memory☆25Updated 10 years ago
- Bypass Google's Santa☆22Updated 9 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- MPRESS dumper for OS X☆66Updated 10 years ago
- An OSX exploitation helper library.☆35Updated 9 years ago
- Patch kextd using radare2☆16Updated 9 years ago
- Simple code to trigger low hanging fruit in IOHIDFamily.kext in OS X 10.11.5☆14Updated 8 years ago
- Anti Hacking Team TrustedBSD module☆26Updated 10 years ago
- A kernel extension and userland daemon to patch applications☆103Updated 11 years ago
- ☆24Updated 11 years ago
- Very simple runtime hooking library for OS X.☆15Updated 9 years ago
- Small util to dump the IDT table of a running OS X system with kmem enabled☆20Updated 10 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- The grey fox☆25Updated 8 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 9 years ago
- IDA recompiler☆31Updated 10 years ago
- Materials from presentation☆20Updated 9 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- Some tools for EFI hackery☆41Updated 13 years ago
- A TrustedBSD module to control execution of binaries with suid bit set☆37Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- A PoC Mach-O infector via library injection☆64Updated 12 years ago
- ☆16Updated 7 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Updated 12 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆59Updated 5 years ago