The current repository contains all the scripts needed to build kernel-mode mac-a-mal malicious activity hooking on macOS.
☆86Sep 22, 2018Updated 7 years ago
Alternatives and similar repositories for mac-a-mal
Users that are interested in mac-a-mal are comparing it to the libraries listed below
Sorting:
- The current repository contains all the scripts needed to complement kernel-mode mac-a-mal malicious activity hooking on macOS to Cuckoo …☆50Jun 12, 2018Updated 7 years ago
- This repository is a part of GSoC Project 2019 which intends to add the macOS support for Cuckoo Sandbox. This repository helps setting u…☆11Aug 26, 2019Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- The grey fox☆25Jun 22, 2016Updated 9 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Apr 8, 2020Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- multi_path exploit now with remount for iOS 11.3.X (english version)☆19Jul 4, 2018Updated 7 years ago
- Windows Live Artifacts Acquisition Script☆190Jun 20, 2022Updated 3 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆80May 10, 2018Updated 7 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- writings on anti-reverse engineering.☆290Nov 13, 2021Updated 4 years ago
- adversarial machine learning for anti-malware software☆12May 17, 2018Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Radare 2 wiki☆94Apr 24, 2020Updated 5 years ago
- macOS Private KPI Symbol Resolver☆49Feb 21, 2017Updated 9 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- XNU Rootkit Framework☆126Jan 3, 2015Updated 11 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 7 years ago
- An attempt at Process Doppelgänging☆183Dec 21, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆302Jan 12, 2023Updated 3 years ago
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- ☆24Sep 26, 2017Updated 8 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 7 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Oct 19, 2017Updated 8 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆837Nov 19, 2024Updated last year