its-a-feature / dylibHijackScanner
Objective C dylibHijackScanner and analysis tool
☆37Updated last year
Alternatives and similar repositories for dylibHijackScanner:
Users that are interested in dylibHijackScanner are comparing it to the libraries listed below
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆43Updated last year
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆44Updated 2 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆13Updated 3 years ago
- If you have any questions, please open an issue.☆24Updated 2 years ago
- macOS shellcode loader written in Objective-C☆47Updated 2 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 3 years ago
- PoC of macho loading from memory☆53Updated 3 months ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆38Updated 2 years ago
- Smuggle a file to a user's browser☆19Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆11Updated 3 years ago
- macOS dylib stager☆31Updated 3 weeks ago
- Brew Local Privilege Escalation exploit on Intel macOS☆17Updated 11 months ago
- ☆23Updated 2 weeks ago
- LoadLibrary for offensive operations☆32Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆11Updated last year
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- POC for unauthenticated RCE in Aspect Unified Installation Assistant by Aspect Software found in 2021.☆12Updated last year
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆22Updated 3 years ago
- Application Hijack Scanner for macOS☆69Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Updated 3 years ago
- Some of my custom "tools".☆22Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆18Updated last week
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- A proof of concept for a clickjacking attack on macOS.☆94Updated last year
- Tools for Attacking Pleasant Password Server☆21Updated last year
- ☆66Updated 5 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆14Updated 8 months ago