objective-see / ProcInfoExample
example project, utilizing Proc Info library
☆67Updated 3 years ago
Related projects: ⓘ
- OSX Events Monitor☆21Updated 5 years ago
- checks if an application is pristine (untampered) and from the official Mac App Store☆70Updated 3 years ago
- A module to expose the Endpoint Security library to Swift☆20Updated 5 years ago
- macOS XProtect definition files☆38Updated 2 years ago
- Objective-See's Products☆12Updated 9 years ago
- macOS application that makes use of the EndpointSecurity framework☆18Updated 5 years ago
- View all modules on that are loaded in the OS kernel☆66Updated last year
- Secure example of an XPC helper written in Swift☆99Updated 4 years ago
- Notifies the user when macOS Security components like Gatekeeper and XProtect have been updated☆60Updated 3 years ago
- Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binar…☆90Updated 2 years ago
- XProtect configuration files stats☆20Updated 6 years ago
- Parse the Mac Quickook index.sqlite database☆53Updated 7 years ago
- monitor macOS for malicious activity☆230Updated 5 years ago
- ☆126Updated this week
- process info/monitoring library for macOS☆413Updated 3 years ago
- [⛔️ Deprecated] Venator is a python tool used to gather data for proactive detection of malicious activity on macOS devices.☆174Updated 4 years ago
- A kernel extension to mitigate Gatekeeper bypasses☆49Updated 8 years ago
- View and remove notification messages from Apple's "Notification Database"☆100Updated 3 years ago
- Research about malware that infects the EFI and SMC of Apple MacBooks.☆54Updated 6 months ago
- Automatically exported from code.google.com/p/pac4mac☆39Updated 5 years ago
- ☆64Updated last year
- The current repository contains all the scripts needed to build kernel-mode mac-a-mal malicious activity hooking on macOS.☆81Updated 5 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆114Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆60Updated 6 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆37Updated 3 years ago
- Every OS X/ macOS white paper☆114Updated 4 years ago
- Scan your computer for applications that are either susceptible to dylib hijacking or have been hijacked.☆79Updated last year
- This is a work-in-progress command line tool for reversing run-only AppleScripts. It will help parse the output of applescript-disassembl…☆61Updated 3 years ago
- A (basic) Mach-O Library☆20Updated 3 years ago
- macOS Endpoint Security Message Analysis Tool☆45Updated 2 years ago