objective-see / ProcInfoExample
example project, utilizing Proc Info library
☆67Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for ProcInfoExample
- checks if an application is pristine (untampered) and from the official Mac App Store☆70Updated 3 years ago
- macOS XProtect definition files☆38Updated 2 years ago
- OSX Events Monitor☆21Updated 6 years ago
- macOS application that makes use of the EndpointSecurity framework☆18Updated 5 years ago
- A module to expose the Endpoint Security library to Swift☆20Updated 5 years ago
- Secure example of an XPC helper written in Swift☆100Updated 4 years ago
- Official Black Hat Arsenal Security Tools Repository☆62Updated 6 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 5 years ago
- A Kext that can be used to disable Rootless in OS X El Capitan/macOS Sierra. You need to sign it OR use an exploit to make OS X load it.☆78Updated 4 years ago
- View and remove notification messages from Apple's "Notification Database"☆100Updated 3 years ago
- Objective-See's Products☆12Updated 9 years ago
- [⛔️ Deprecated] Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.☆176Updated 4 years ago
- process info/monitoring library for macOS☆414Updated 3 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆116Updated 3 years ago
- Phorion Kronos is a macOS security tool designed to enhance Apple's Transparency Consent and Control (TCC) security and privacy mechanism…☆71Updated last year
- monitor macOS for malicious activity☆230Updated 5 years ago
- A kernel extension to mitigate Gatekeeper bypasses☆49Updated 9 years ago
- Notifies the user when macOS Security components like Gatekeeper and XProtect have been updated☆60Updated 3 years ago
- Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binar…☆91Updated 2 years ago
- Breaking the iCloud Keychain Artifacts☆94Updated 10 months ago
- View all modules on that are loaded in the OS kernel☆67Updated last year
- A PoC Mach-O infector via library injection☆64Updated 11 years ago
- A (basic) Mach-O Library☆20Updated 3 years ago
- Research about malware that infects the EFI and SMC of Apple MacBooks.☆55Updated 8 months ago
- XProtect configuration files stats☆20Updated 6 years ago
- Utility to manipulate codesigned application in Mac OS X. Demonstrate the use of csops system call.☆71Updated 8 months ago
- The current repository contains all the scripts needed to build kernel-mode mac-a-mal malicious activity hooking on macOS.☆82Updated 6 years ago
- Integrity validator for iOS devices☆101Updated 5 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Updated 9 years ago