n0fate / OS-X-ContinuityLinks
Script for forensic analysis of the OS X Continuity
☆20Updated 7 years ago
Alternatives and similar repositories for OS-X-Continuity
Users that are interested in OS-X-Continuity are comparing it to the libraries listed below
Sorting:
- Breaking the iCloud Keychain Artifacts☆102Updated last year
- Research about malware that infects the EFI and SMC of Apple MacBooks.☆61Updated 4 months ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- macOS/iOS database location scraper to extract location data☆83Updated 2 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Updated 7 years ago
- Dump the iOS Frequent Location binary plist files☆85Updated 6 years ago
- ☆62Updated 8 years ago
- macOS XProtect definition files☆40Updated 3 years ago
- Extraction of iMessage Data via XSS☆53Updated 9 years ago
- Parse the Mac Quickook index.sqlite database☆55Updated 8 years ago
- Decrypts local iOS backups and recreates file system, with a framework for automatically extracting useful information☆43Updated 9 years ago
- iOS forensics utility☆12Updated 7 years ago
- Resources for HFS+ Forensics☆37Updated 9 years ago
- Convert MacOS plist password file to hash file for password crackers☆37Updated 6 years ago
- Python utilities related to plists☆54Updated last year
- anyKextLoader is a program that can be used to disable SIP without rebooting.☆39Updated 9 years ago
- Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format.☆105Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- The current repository contains all the scripts needed to build kernel-mode mac-a-mal malicious activity hooking on macOS.☆85Updated 6 years ago
- OSX Events Monitor☆22Updated 6 years ago
- ☆39Updated 9 years ago
- example project, utilizing Proc Info library☆70Updated 4 years ago
- A Kext that can be used to disable Rootless in OS X El Capitan/macOS Sierra. You need to sign it OR use an exploit to make OS X load it.☆78Updated 5 years ago
- A parsing tool for backgrounditems.btm☆50Updated last year
- Dump contents of an iOS device iTunes backup☆35Updated 3 years ago
- Apple SMC (System Management Controller) API fuzzer☆70Updated last year
- Vulnerability Reports by Aleph Research☆36Updated last year
- A Python reimplementation of some of the functionality of InflatableDonkey's iOS 9 iCloud Proof of Concept code☆38Updated 9 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 9 years ago
- Mac OS X Memory Analysis Toolkit