tokyoneon / hashdump.pyLinks
macOS/OSX hash dump script taken from Empire framework
☆13Updated 7 years ago
Alternatives and similar repositories for hashdump.py
Users that are interested in hashdump.py are comparing it to the libraries listed below
Sorting:
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆28Updated 5 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Updated 2 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Updated 6 years ago
- Automated install process for Phishing Frenzy☆24Updated 11 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Updated 7 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- ☆12Updated 11 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆42Updated 7 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 5 years ago
- iOS forensics utility☆12Updated 7 years ago
- Automatically spin up infra for phishing☆65Updated 6 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Updated 5 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- New and Improved☆17Updated 9 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated last week
- Mass malicious script dump/Malware src dump☆16Updated 9 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Updated 4 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆11Updated 5 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Updated 4 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆14Updated 5 years ago
- ☆53Updated 4 years ago
- macOS Client-Side Phishing lock screen payload☆129Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 3 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆123Updated 5 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆66Updated 8 months ago
- Convert MacOS plist password file to hash file for password crackers☆37Updated 7 years ago