slyd0g / SwiftLiverpool
Enumerate Location Services using CoreLocation API on macOS
☆18Updated 3 years ago
Alternatives and similar repositories for SwiftLiverpool:
Users that are interested in SwiftLiverpool are comparing it to the libraries listed below
- ☆48Updated 9 months ago
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆30Updated 2 months ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆43Updated last year
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆19Updated last year
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆44Updated 2 years ago
- ☆86Updated 6 months ago
- ☆28Updated last year
- macOS Security Research☆115Updated last year
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆39Updated 3 years ago
- PoC of macho loading from memory☆54Updated 4 months ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- ☆29Updated 6 months ago
- Objective C dylibHijackScanner and analysis tool☆39Updated last year
- MacOS kernel memory leak (4 bytes)☆30Updated 4 years ago
- Swift code to programmatically perform dylib injection☆50Updated 2 years ago
- My collection of PoCs☆26Updated last year
- machofile is a module to parse Mach-O binary files☆49Updated last year
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆57Updated 2 years ago
- Examples of programmatically interacting with ioreg and sysctl to query system info☆10Updated 2 years ago
- ☆76Updated last month
- ☆98Updated last year
- Published security vulnerabilities for Apple platform with linked public repositories☆29Updated 9 months ago
- Repository for Flare-On challenges and solutions/code☆9Updated 4 months ago
- ☆30Updated 2 years ago
- Swift code to run a dylib on disk☆15Updated 2 years ago
- File permission and SIP misbehaviour hunter☆13Updated 2 years ago
- Exploit for CVE-2023-32364☆21Updated last year
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆22Updated 3 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆13Updated 3 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆38Updated 2 years ago