jmagers / MacinHashLinks
Convert MacOS plist password file to hash file for password crackers
☆37Updated 7 years ago
Alternatives and similar repositories for MacinHash
Users that are interested in MacinHash are comparing it to the libraries listed below
Sorting:
- a collection of profiles for macOS designed for penetration testing or red teaming☆37Updated 6 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- A triage data collection script for macOS☆28Updated 5 years ago
- macOS Client-Side Phishing lock screen payload☆129Updated 6 years ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Updated 8 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆56Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 weeks ago
- DNS logging, detection, ...☆15Updated 3 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14Updated 4 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆28Updated 5 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Updated 5 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- A simple yet beautiful phishing proxy.☆59Updated 4 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Swift Command line tool used for proactive detection of malicious activity on macOS systems.☆67Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- apbleed☆24Updated 11 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated last year
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 12 years ago
- One-off scripts☆52Updated 8 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 5 years ago
- Get clients and access points.☆48Updated 6 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Automatically spin up infra for phishing☆65Updated 5 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Ansible scripts to build an attack box☆24Updated 7 years ago