mnrkbys / norimaciView external linksLinks
Norimaci is a simple and lightweight malware analysis sandbox for macOS
☆71Mar 3, 2020Updated 5 years ago
Alternatives and similar repositories for norimaci
Users that are interested in norimaci are comparing it to the libraries listed below
Sorting:
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- Forensic Artifact Collection Tool for macOS☆118Jul 28, 2025Updated 6 months ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆109Oct 29, 2022Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- macOS forensic timeline generator using the analysis result DBs of mac_apt☆93Sep 7, 2023Updated 2 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- File system monitoring utility based on FSEvents API MacOS☆10May 4, 2020Updated 5 years ago
- ☆13Mar 1, 2024Updated last year
- ☆30Jul 28, 2024Updated last year
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- Command and Control Framework☆13Mar 23, 2024Updated last year
- ☆89Feb 11, 2022Updated 4 years ago
- Python wrapper around the Mach VM APIs☆20Jun 4, 2012Updated 13 years ago
- Get Certificates From Jamf Pro Into Your iOS Apps☆16May 5, 2025Updated 9 months ago
- Carbon Black Response IR tool☆55Dec 10, 2020Updated 5 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- Store and retrieve your passwords from a secure offline database. Check if your passwords has leaked previously to prevent targeted passw…☆33Mar 4, 2023Updated 2 years ago
- A simple demonstration of the macOS Network Extension☆16May 12, 2021Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Incident Response - Fast suspicious file finder☆249Jan 24, 2026Updated 3 weeks ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- Wireless Intrusion Detection System for Hak5's WiFi Coconut☆31Apr 5, 2023Updated 2 years ago
- Tools to measure an app's App Sandbox usage☆26May 20, 2020Updated 5 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Post-Infection Collection Toolkit☆95Jan 31, 2023Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- A command line tool for pstree-like output on macOS with additional pid capturing capabilities☆276Aug 23, 2024Updated last year
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Swift Command line tool used for proactive detection of malicious activity on macOS systems.☆67Jul 1, 2020Updated 5 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆132Nov 7, 2024Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105May 11, 2022Updated 3 years ago
- macOS application that makes use of the EndpointSecurity framework☆19Aug 1, 2019Updated 6 years ago