objective-see / ProcInfoExample
example project, utilizing Proc Info library
☆70Updated 4 years ago
Alternatives and similar repositories for ProcInfoExample:
Users that are interested in ProcInfoExample are comparing it to the libraries listed below
- checks if an application is pristine (untampered) and from the official Mac App Store☆73Updated 4 years ago
- A module to expose the Endpoint Security library to Swift☆20Updated 5 years ago
- OSX Events Monitor☆22Updated 6 years ago
- macOS XProtect definition files☆40Updated 3 years ago
- macOS application that makes use of the EndpointSecurity framework☆19Updated 5 years ago
- View all modules on that are loaded in the OS kernel☆73Updated 2 years ago
- XProtect configuration files stats☆20Updated 7 years ago
- Notifies the user when macOS Security components like Gatekeeper and XProtect have been updated☆61Updated 4 years ago
- View and remove notification messages from Apple's "Notification Database"☆103Updated 4 years ago
- process info/monitoring library for macOS☆419Updated 4 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- Secure example of an XPC helper written in Swift☆105Updated 5 years ago
- Objective-See's Products☆13Updated 10 years ago
- Mapping XProtect's obfuscated malware family names to common industry names.☆84Updated 11 months ago
- Official Black Hat Arsenal Security Tools Repository☆65Updated 7 years ago
- A Kext that can be used to disable Rootless in OS X El Capitan/macOS Sierra. You need to sign it OR use an exploit to make OS X load it.☆78Updated 5 years ago
- Parse the Mac Quickook index.sqlite database☆53Updated 8 years ago
- A (basic) Mach-O Library☆21Updated 3 years ago
- Phorion Kronos is a macOS security tool designed to enhance Apple's Transparency Consent and Control (TCC) security and privacy mechanism…☆72Updated last year
- Golang command line tool for the macOS Endpoint Security Framework☆29Updated 5 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆39Updated 3 years ago
- Visually explore all running tasks (processes) ....viewing its signature status, loaded dylibs, open files, network connection, and much …☆95Updated 4 years ago
- Scan your computer for applications that are either susceptible to dylib hijacking or have been hijacked.☆91Updated last year
- [⛔️ Deprecated] Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.☆177Updated 4 years ago
- ☆62Updated 7 years ago
- monitor macOS for malicious activity☆233Updated last month
- An app to protect against process injection and suspicious file links on macOS☆219Updated 3 years ago
- A minimal malware analysis sandbox for macOS☆28Updated 2 years ago
- Breaking the iCloud Keychain Artifacts☆99Updated last year
- sniff mouse and keyboard events☆220Updated 4 years ago