mnrkbys / norimaci
Norimaci is a simple and lightweight malware analysis sandbox for macOS
☆67Updated 4 years ago
Alternatives and similar repositories for norimaci:
Users that are interested in norimaci are comparing it to the libraries listed below
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆31Updated 3 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆41Updated 4 years ago
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆105Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A minimal malware analysis sandbox for macOS☆27Updated last year
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆38Updated 2 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆42Updated last year
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆38Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 2 years ago
- machofile is a module to parse Mach-O binary files☆48Updated 11 months ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆45Updated 3 years ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- ☆31Updated 7 months ago
- Surface Analysis System on Cloud☆19Updated last year
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆18Updated 10 months ago
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆30Updated this week
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Updated 3 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆64Updated 11 months ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆77Updated 2 years ago
- Enumerate Location Services using CoreLocation API on macOS☆18Updated 3 years ago
- Application Hijack Scanner for macOS☆68Updated 3 years ago
- Presentations from the CX Security Labs team☆33Updated 3 months ago
- isodump - ISO dump utility☆39Updated 5 years ago
- YARI is an interactive debugger for YARA Language.☆88Updated last week
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- Objective C dylibHijackScanner and analysis tool☆37Updated last year
- Payload designed for targeting Jamf enrolled devices.☆37Updated last year