l0psec / arm64_macOS_Syscalls
☆39Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for arm64_macOS_Syscalls
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆28Updated 3 weeks ago
- Swift implementation of in-memory Mach-O loading on macOS☆61Updated 2 years ago
- Enumerate Location Services using CoreLocation API on macOS☆17Updated 2 years ago
- machofile is a module to parse Mach-O binary files☆48Updated 9 months ago
- ☆91Updated last year
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆18Updated 8 months ago
- macOS Security Research☆108Updated 8 months ago
- Discover which process execute a hunted binary inside macOS☆24Updated 2 years ago
- ☆85Updated last month
- Redirect spawned iOS application stdout and stderr to pty☆25Updated 10 months ago
- Swift code to programmatically perform dylib injection☆50Updated 2 years ago
- arm64 and arm64e dylib injector☆28Updated 9 months ago
- ☆30Updated 5 months ago
- ☆27Updated last year
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆41Updated 2 years ago
- Enumerate running processes using com.apple.CodeSigningHelper☆13Updated 7 months ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆42Updated last year
- PoC of macho loading from memory☆52Updated this week
- My collection of PoCs☆25Updated last year
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆57Updated last year
- ☆24Updated last month
- Published security vulnerabilities for Apple platform with linked public repositories☆27Updated 4 months ago
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆71Updated 8 months ago
- Exploit for CVE-2023-32364☆21Updated last year
- A general purpose toolkit to make vulnerability research on macOS easier.☆71Updated this week
- A Ghidra extension for reverse-engineering macOS binaries.☆12Updated 3 weeks ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆38Updated 3 years ago
- Objective C dylibHijackScanner and analysis tool☆34Updated last year
- Objective-C runtime tracing tool☆40Updated last year
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆38Updated 2 years ago