A OS X crypto ransomware PoC
☆89Sep 4, 2015Updated 10 years ago
Alternatives and similar repositories for gopher
Users that are interested in gopher are comparing it to the libraries listed below
Sorting:
- ☆48Oct 19, 2015Updated 10 years ago
- Exploit code for CVE-2016-1757☆83Apr 27, 2016Updated 9 years ago
- Bypass Google's Santa☆22Apr 13, 2015Updated 10 years ago
- A PoC Mach-O infector via library injection☆65Mar 5, 2013Updated 13 years ago
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- A kernel extension to mitigate Gatekeeper bypasses☆49Nov 9, 2015Updated 10 years ago
- Some files for hacking mach binaries in memory☆18Mar 29, 2015Updated 10 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Sep 3, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Small util to discover OS X sysent via bruteforce☆33Jun 27, 2016Updated 9 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- An OSX exploitation helper library.☆35Nov 29, 2015Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆21Dec 3, 2015Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- The userland component of rootpipe fix for Mavericks☆14Apr 13, 2015Updated 10 years ago
- System Integrity Protection (SIP) bypass for OSX 10.11.1 - 10.11.2 - 10.11.3☆144Apr 1, 2016Updated 9 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Read and write physical memory on OS X☆136Aug 14, 2015Updated 10 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆119Aug 20, 2015Updated 10 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- The kernel component of rootpipe fix for Mavericks☆27Apr 13, 2015Updated 10 years ago
- capstone based disassembler for extracting to binnavi☆229Jun 8, 2016Updated 9 years ago
- Mac OS X rootkit - for learning purposes☆129May 19, 2014Updated 11 years ago
- ☆27Jul 16, 2014Updated 11 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- macOS Client-Side Phishing lock screen payload☆129Apr 14, 2019Updated 6 years ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Kernel extension to disable anti-debug tricks and other useful XNU "features"☆224Apr 3, 2023Updated 2 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.☆86May 18, 2016Updated 9 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- checks if an application is pristine (untampered) and from the official Mac App Store☆78Feb 1, 2021Updated 5 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Sep 1, 2015Updated 10 years ago