l0psec / arm64_macOS_Syscalls
☆49Updated 9 months ago
Alternatives and similar repositories for arm64_macOS_Syscalls:
Users that are interested in arm64_macOS_Syscalls are comparing it to the libraries listed below
- Enumerate Location Services using CoreLocation API on macOS☆18Updated 3 years ago
- Swift implementation of in-memory Mach-O loading on macOS☆63Updated 2 years ago
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆30Updated 3 months ago
- machofile is a module to parse Mach-O binary files☆51Updated last year
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆44Updated 2 years ago
- Swift code to programmatically perform dylib injection☆50Updated 2 years ago
- ☆108Updated last year
- My collection of PoCs☆26Updated last year
- ☆28Updated 2 years ago
- Objective C dylibHijackScanner and analysis tool☆39Updated last year
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆43Updated last year
- ☆30Updated 6 months ago
- Redirect spawned iOS application stdout and stderr to pty☆28Updated 2 months ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆20Updated last year
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆38Updated 2 years ago
- macOS Security Research☆116Updated last year
- A Ghidra extension for reverse-engineering macOS binaries.☆18Updated 3 months ago
- Code lifting for executing a visionOS library os macOS using QBDL and QBDI☆17Updated 6 months ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆78Updated 2 years ago
- A general purpose toolkit to make vulnerability research on macOS easier.☆78Updated last month
- Enumerate running processes using com.apple.CodeSigningHelper☆13Updated last year
- arm64 and arm64e dylib injector☆31Updated last year
- Exploit for CVE-2023-32364☆21Updated last year
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆78Updated last year
- Published security vulnerabilities for Apple platform with linked public repositories☆30Updated 9 months ago
- PoC of macho loading from memory☆55Updated 4 months ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆39Updated 3 years ago
- Discover which process execute a hunted binary inside macOS☆24Updated 3 years ago
- Mickey's Blogs☆38Updated 2 weeks ago
- Brew Local Privilege Escalation exploit on Intel macOS☆18Updated last year