JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.
☆158Sep 10, 2021Updated 4 years ago
Alternatives and similar repositories for macOS-ATTACK-DATASET
Users that are interested in macOS-ATTACK-DATASET are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Jul 27, 2021Updated 4 years ago
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- ☆100Feb 16, 2021Updated 5 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 4 years ago
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- PoC of macho loading from memory☆58Nov 18, 2024Updated last year
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆109Oct 29, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Discover which process execute a hunted binary inside macOS☆27Dec 15, 2021Updated 4 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 3 years ago
- Windows Events Attack Samples☆2,531Jan 24, 2023Updated 3 years ago
- macOS Offensive Tools☆270Sep 28, 2023Updated 2 years ago
- Swift Command line tool used for proactive detection of malicious activity on macOS systems.☆67Jul 1, 2020Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Collection of macOS persistence methods and miscellaneous tools in JXA☆288Aug 3, 2023Updated 2 years ago
- PCAP Samples for Different Post Exploitation Techniques☆368Apr 29, 2021Updated 4 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- ☆2,531Updated this week
- Tracking of offensive macOS tooling, blogs, and related helpful information☆194Nov 18, 2024Updated last year
- ☆11Dec 9, 2025Updated 3 months ago
- A library to parse macOS LoginItems☆18Aug 28, 2022Updated 3 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Open Source Security Events Metadata (OSSEM)☆1,290Feb 27, 2023Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Execute MachO binaries in memory using CGo☆79May 24, 2021Updated 4 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Sep 8, 2021Updated 4 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Building environments to replicate small networks and deploy applications☆331Jan 9, 2026Updated 2 months ago