slyd0g / SwiftSpyLinks
macOS keylogger, clipboard monitor, and screenshotter
☆89Updated 4 years ago
Alternatives and similar repositories for SwiftSpy
Users that are interested in SwiftSpy are comparing it to the libraries listed below
Sorting:
- ObjectiveC CLI tool for interacting with macOS Keychain☆80Updated 3 years ago
- Swift implementation of in-memory Mach-O loading on macOS☆65Updated 3 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Updated 4 years ago
- A proof of concept for a clickjacking attack on macOS.☆95Updated last year
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆22Updated 6 years ago
- ☆17Updated 2 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆80Updated 3 years ago
- Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binar…☆97Updated 3 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆122Updated 4 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Updated 3 years ago
- ☆33Updated last year
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆54Updated 4 years ago
- Swift code to programmatically perform dylib injection☆51Updated 2 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆43Updated 4 years ago
- JavaScript for Automation (JXA) macOS agent☆85Updated 3 weeks ago
- ESF modular ingestion tool for development and research.☆37Updated 3 years ago
- Swift 5 macOS agent☆111Updated last year
- Collection of macOS persistence methods and miscellaneous tools in JXA☆283Updated 2 years ago
- Scan your computer for applications that are either susceptible to dylib hijacking or have been hijacked.☆104Updated 2 weeks ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆45Updated 2 years ago
- Execute MachO binaries in memory using CGo☆79Updated 4 years ago
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆110Updated 2 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆187Updated 11 months ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆338Updated 3 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- Objective C dylibHijackScanner and analysis tool☆39Updated 2 years ago
- macOS Offensive Tools☆271Updated 2 years ago
- ☆52Updated last year
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Updated 4 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆24Updated 4 years ago