morganc3 / 1password-exploits
☆10Updated 8 months ago
Alternatives and similar repositories for 1password-exploits:
Users that are interested in 1password-exploits are comparing it to the libraries listed below
- Payload designed for targeting Jamf enrolled devices.☆38Updated last year
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Updated 4 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆77Updated 3 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binar…☆97Updated 2 years ago
- Holds the public Hacking the Cloud CTFs.☆55Updated last year
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆17Updated 3 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 4 years ago
- A ruleset to find potentially malicious code in macOS malware samples☆40Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 5 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆108Updated 7 months ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆116Updated last year
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- ☆15Updated 2 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆27Updated 7 months ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆54Updated 3 years ago
- ☆34Updated last year
- Swift 5 macOS agent☆105Updated 9 months ago
- ☆57Updated last year
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Updated 2 years ago
- ☆33Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆75Updated 3 weeks ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆84Updated last month
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆103Updated 3 years ago
- List of Red Team Resources☆17Updated 4 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Updated 4 years ago
- Qemuno Framework☆24Updated 2 years ago