loneicewolf / exp312-osmrLinks
My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.
☆23Updated 3 years ago
Alternatives and similar repositories for exp312-osmr
Users that are interested in exp312-osmr are comparing it to the libraries listed below
Sorting:
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆44Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Objective C dylibHijackScanner and analysis tool☆39Updated last year
- Brew Local Privilege Escalation exploit on Intel macOS☆19Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆13Updated 3 years ago
- ☆48Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆44Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆23Updated 4 years ago
- Collection of scripts that I created to make my life easier.☆11Updated 4 years ago
- ☆12Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆14Updated 5 years ago
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆35Updated this week
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆26Updated 2 years ago
- ☆23Updated last year
- ☆59Updated last year
- Python3 tool to perform password spraying using RDP☆17Updated last year
- ☆24Updated 4 months ago
- Swift code to run a dylib on disk☆16Updated 3 years ago
- PoC of macho loading from memory☆56Updated 6 months ago
- OSED Practice binary☆24Updated last year
- Smuggle a file to a user's browser☆20Updated 3 years ago
- some sploits☆17Updated 8 months ago