mattreduce / eddieLinks
Eddie Vetter - triage macOS applications for security research
☆16Updated 4 years ago
Alternatives and similar repositories for eddie
Users that are interested in eddie are comparing it to the libraries listed below
Sorting:
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated 6 months ago
- ☆12Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆32Updated 4 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆13Updated 6 months ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 4 years ago
- HoneyDB Python Module☆13Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- Forked and updated with some additional features over the original☆17Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Toolkit to detected abnormal activities on a Windows machine.☆11Updated 9 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Automated deployment and configuration of a Mythic server using Terraform and Ansible☆9Updated 2 years ago