objective-see / ProcInfoExampleLinks
example project, utilizing Proc Info library
☆70Updated 4 years ago
Alternatives and similar repositories for ProcInfoExample
Users that are interested in ProcInfoExample are comparing it to the libraries listed below
Sorting:
- checks if an application is pristine (untampered) and from the official Mac App Store☆77Updated 4 years ago
- process info/monitoring library for macOS☆424Updated 4 years ago
- OSX Events Monitor☆22Updated 7 years ago
- A module to expose the Endpoint Security library to Swift☆20Updated 6 years ago
- sniff mouse and keyboard events☆224Updated 4 years ago
- Parse the Mac Quickook index.sqlite database☆55Updated 9 years ago
- An app to protect against process injection and suspicious file links on macOS☆230Updated 4 years ago
- macOS application that makes use of the EndpointSecurity framework☆19Updated 6 years ago
- monitor macOS for malicious activity☆236Updated 9 months ago
- macOS XProtect definition files☆40Updated 3 years ago
- A simple auditing utility for macOS☆292Updated 4 years ago
- [⛔️ Deprecated] Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.☆177Updated 5 years ago
- Presentation Archives for my macOS and iOS Related Research☆258Updated 8 months ago
- Every OS X/ macOS white paper☆114Updated 5 years ago
- View and remove notification messages from Apple's "Notification Database"☆105Updated 4 years ago
- A (basic) Mach-O Library☆22Updated 4 years ago
- Breaking the iCloud Keychain Artifacts☆104Updated last year
- Objective-See's Products☆14Updated 10 years ago
- Official Black Hat Arsenal Security Tools Repository☆66Updated 7 years ago
- Research about malware that infects the EFI and SMC of Apple MacBooks.☆62Updated 7 months ago
- Notifies the user when macOS Security components like Gatekeeper and XProtect have been updated☆60Updated 4 years ago
- ☆62Updated 8 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- A Kext that can be used to disable Rootless in OS X El Capitan/macOS Sierra. You need to sign it OR use an exploit to make OS X load it.☆79Updated 5 years ago
- View all modules on that are loaded in the OS kernel☆84Updated 2 years ago
- Secure example of an XPC helper written in Swift☆109Updated 5 years ago
- A macOS <= 10.14.3 Keychain exploit☆248Updated 6 years ago
- Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format.☆105Updated 7 years ago
- XProtect configuration files stats☆21Updated 8 years ago
- Mac OS X Memory Analysis Toolkit☆171Updated 9 years ago