xorrior / macOSToolsLinks
macOS Offensive Tools
☆270Updated last year
Alternatives and similar repositories for macOSTools
Users that are interested in macOSTools are comparing it to the libraries listed below
Sorting:
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆121Updated 4 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆282Updated 2 years ago
- macOS persistence tool☆225Updated 3 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆335Updated 3 years ago
- macOS Initial Access Payload Generator☆316Updated last year
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆152Updated 2 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆184Updated 10 months ago
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆109Updated 2 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 10 months ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- ☆99Updated 4 years ago
- A proof of concept for a clickjacking attack on macOS.☆95Updated last year
- Encrypted exploit delivery for the masses☆268Updated 5 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆96Updated last year
- Swift 5 macOS agent☆109Updated last year
- Apfell Golang macOS/Linux/Windows implant☆89Updated 4 years ago
- Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binar…☆97Updated 3 years ago
- Exploits and advisories☆202Updated 3 weeks ago
- Execute MachO binaries in memory using CGo☆81Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Updated 4 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆180Updated 2 years ago
- Presentation material presented by Outflank team members at public events.☆190Updated 9 months ago
- lateral movement techniques that can be used during red team exercises☆272Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆148Updated 5 years ago
- Small scripts that make life better☆299Updated 7 months ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Swift code to programmatically perform dylib injection☆51Updated 2 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Updated 4 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago