usiegl00 / tamatoaView external linksLinks
If you have any questions, please open an issue.
☆25Apr 6, 2022Updated 3 years ago
Alternatives and similar repositories for tamatoa
Users that are interested in tamatoa are comparing it to the libraries listed below
Sorting:
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- ☆15May 26, 2021Updated 4 years ago
- Objective C dylibHijackScanner and analysis tool☆38Jul 12, 2023Updated 2 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 5 months ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Jul 27, 2021Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Apr 15, 2021Updated 4 years ago
- ☆68Nov 15, 2022Updated 3 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- Execute MachO binaries in memory using CGo☆79May 24, 2021Updated 4 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- MiniDump a process in memory with rust☆37Jun 20, 2021Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- PoC of macho loading from memory☆58Nov 18, 2024Updated last year
- Swift implementation of in-memory Mach-O loading on macOS☆68Jul 19, 2022Updated 3 years ago
- TypeScript/JavaScript client libraries for Sliver☆24Feb 27, 2023Updated 2 years ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- ☆50Jun 28, 2022Updated 3 years ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- Chromium Cookie import / export tool☆11Jul 21, 2024Updated last year
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 8 months ago
- ☆12Aug 10, 2024Updated last year
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- A collection of offensive Nim example code☆74Dec 21, 2021Updated 4 years ago