its-a-feature / macos_execute_from_memoryLinks
PoC of macho loading from memory
☆57Updated 7 months ago
Alternatives and similar repositories for macos_execute_from_memory
Users that are interested in macos_execute_from_memory are comparing it to the libraries listed below
Sorting:
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆44Updated 2 years ago
- If you have any questions, please open an issue.☆24Updated 3 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- In 'n Out - See what goes in and comes out of PEs☆34Updated 3 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆13Updated 3 years ago
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Updated 4 years ago
- Loads .NET Assembly Via CLR Loader☆16Updated 6 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 2 years ago
- ☆24Updated 3 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated 7 months ago
- ☆15Updated 4 years ago
- ☆82Updated 3 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 3 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆43Updated 4 years ago
- ☆17Updated 4 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 3 years ago
- ☆55Updated 3 years ago
- all credits go to @mgeeky☆64Updated 3 years ago
- ☆14Updated 3 years ago
- Swift code to run a dylib on disk☆16Updated 3 years ago
- ☆37Updated 7 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆61Updated 3 years ago
- macOS shellcode loader written in Objective-C☆47Updated 2 years ago
- Objective C dylibHijackScanner and analysis tool☆39Updated last year
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- ☆37Updated 3 years ago