rupa / applescriptLinks
some utilities written in applescript
☆15Updated 14 years ago
Alternatives and similar repositories for applescript
Users that are interested in applescript are comparing it to the libraries listed below
Sorting:
- Collection of scripts that I created to make my life easier.☆12Updated 4 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Updated 4 years ago
- An example of how a driver can register a handle creation callback.☆15Updated 2 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14Updated 4 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated last year
- A library to parse macOS LoginItems☆18Updated 3 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- PoC of macho loading from memory☆57Updated last year
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Updated 4 years ago
- macOS shellcode loader written in Objective-C☆49Updated 3 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Updated 5 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Updated 10 months ago
- A proof of concept for a clickjacking attack on macOS.☆95Updated last year
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Updated 3 years ago
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆22Updated 6 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- Research into COM☆19Updated 5 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Updated 4 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆25Updated 4 years ago
- ☆24Updated 9 months ago
- Objective C dylibHijackScanner and analysis tool☆40Updated 2 years ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆81Updated 3 years ago
- a collection of profiles for macOS designed for penetration testing or red teaming☆36Updated 6 years ago
- c# reverse shell poc☆27Updated 7 years ago
- ☆17Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- Swift code to run a dylib on disk☆16Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆20Updated last month