macOS XProtect definition files
☆40Mar 25, 2022Updated 3 years ago
Alternatives and similar repositories for XProtect
Users that are interested in XProtect are comparing it to the libraries listed below
Sorting:
- Some of the presentations given by me☆19Aug 8, 2025Updated 6 months ago
- (OS X) Drains battery of laptops via a script. Originally used in an educational-setting to store computers over the summer.☆10May 5, 2014Updated 11 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- ☆40Nov 24, 2013Updated 12 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- CoreFollowUp phishing attack on macOS☆15Mar 15, 2022Updated 3 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- Mapping XProtect's obfuscated malware family names to common industry names.☆94Nov 14, 2025Updated 3 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Modern C++, range-based Mach-O parser designed for embedded use. Uses stack allocations only.☆34Oct 31, 2022Updated 3 years ago
- Adds a system status menu that lists local network Bonjour services.☆18Aug 8, 2020Updated 5 years ago
- Description of Apple's LEAP ISA☆16Nov 21, 2022Updated 3 years ago
- Simple script to help you check for files with execute-as bits set.☆14May 29, 2015Updated 10 years ago
- Process Monitor Library (based on Apple's new Endpoint Security Framework)☆493Oct 20, 2023Updated 2 years ago
- A local privilege escalation chain from user to kernel for MacOS < 10.15.5. CVE-2020–9854☆86Oct 15, 2020Updated 5 years ago
- Simple example that shows how to use AuthorizationExecuteWithPrivileges.☆19Jul 20, 2009Updated 16 years ago
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- The userland component of rootpipe fix for Mavericks☆14Apr 13, 2015Updated 10 years ago
- Bro integration with osquery☆15Mar 24, 2023Updated 2 years ago
- XProtect configuration files stats☆21Dec 1, 2017Updated 8 years ago
- ☆16May 15, 2021Updated 4 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- CVE-2020–9934 POC☆23Jul 28, 2020Updated 5 years ago
- ☆21May 4, 2017Updated 8 years ago
- Disassemble bytecodes as MSIL☆18Jul 31, 2021Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆29Dec 7, 2025Updated 2 months ago
- ☆23May 28, 2021Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- ☆27Jan 8, 2026Updated last month
- ☆34Apr 5, 2017Updated 8 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- A demo showing how to hide UIViews from screenshots & screen-recordings while still showing the view on screen☆31Jun 6, 2024Updated last year