its-a-feature / dylibHijackScanner
Objective C dylibHijackScanner and analysis tool
☆39Updated last year
Alternatives and similar repositories for dylibHijackScanner:
Users that are interested in dylibHijackScanner are comparing it to the libraries listed below
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆44Updated last year
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆44Updated 2 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆13Updated 3 years ago
- If you have any questions, please open an issue.☆24Updated 3 years ago
- PoC of macho loading from memory☆56Updated 5 months ago
- Swift code to programmatically perform dylib injection☆51Updated 2 years ago
- macOS shellcode loader written in Objective-C☆47Updated 2 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆32Updated 4 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- A proof of concept for a clickjacking attack on macOS.☆94Updated last year
- macOS dylib stager☆32Updated 3 months ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- Swift code to run a dylib on disk☆16Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Updated 4 years ago
- Brew Local Privilege Escalation exploit on Intel macOS☆18Updated last year
- Collection of scripts that I created to make my life easier.☆11Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆17Updated 2 months ago
- POC for unauthenticated RCE in Aspect Unified Installation Assistant by Aspect Software found in 2021.☆13Updated last year
- A Reflective Loader for macOS☆105Updated 4 months ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆24Updated 4 years ago
- A simple BOF implementation of klist using Windows API☆32Updated 2 years ago
- Application Hijack Scanner for macOS☆71Updated 3 years ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆43Updated 4 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆23Updated 3 years ago
- LoadLibrary for offensive operations☆33Updated 3 years ago
- Swift implementation of in-memory Mach-O loading on macOS☆63Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago