mattreduce / eddieLinks
Eddie Vetter - triage macOS applications for security research
☆16Updated 4 years ago
Alternatives and similar repositories for eddie
Users that are interested in eddie are comparing it to the libraries listed below
Sorting:
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Updated 3 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 7 months ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆32Updated 4 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- Basic file metadata gathering script☆21Updated 3 months ago
- ☆22Updated 4 years ago
- Provides access to libhashcat☆30Updated last year
- ☆12Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆13Updated 3 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆24Updated 4 years ago
- Automated deployment and configuration of a Mythic server using Terraform and Ansible☆9Updated 2 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆31Updated 8 years ago
- HoneyDB Python Module☆13Updated last year
- extracts shellcode from a nasm compile macho binary☆16Updated 4 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago