phdphuc / mac-a-malLinks
The current repository contains all the scripts needed to build kernel-mode mac-a-mal malicious activity hooking on macOS.
☆86Updated 7 years ago
Alternatives and similar repositories for mac-a-mal
Users that are interested in mac-a-mal are comparing it to the libraries listed below
Sorting:
- The current repository contains all the scripts needed to complement kernel-mode mac-a-mal malicious activity hooking on macOS to Cuckoo …☆50Updated 7 years ago
- This is a malware analyzer for Mac OS X that extends the Cuckoo Sandbox project (https://cuckoosandbox.org/)☆23Updated 9 years ago
- ☆44Updated 8 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
- ☆43Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Updated 7 years ago
- Memory inspection REPL interface☆45Updated 8 years ago
- The grey fox☆25Updated 9 years ago
- ☆53Updated 7 years ago
- Mac OS X rootkit - for learning purposes☆129Updated 11 years ago
- Yet Another YARA rule Generator☆65Updated 7 years ago
- IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform☆117Updated 8 years ago
- ☆68Updated 3 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- macOS XProtect definition files☆40Updated 3 years ago
- ☆28Updated 11 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- macOS Cython IOKit Utility Library☆43Updated 8 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 6 years ago
- ☆99Updated last year
- Imports MSDN documentation into IDA Pro☆52Updated 13 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 6 years ago
- Frida.re based RunPE (and MapViewOfSection) extraction tool☆114Updated 8 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆25Updated 6 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- BASS - BASS Automated Signature Synthesizer☆179Updated 7 years ago
- Automatically exported from code.google.com/p/malware-lu☆56Updated 6 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 6 years ago
- incident response tool for iOS devices☆49Updated 3 years ago