xorrior / macOSTools
macOS Offensive Tools
☆266Updated last year
Alternatives and similar repositories for macOSTools:
Users that are interested in macOSTools are comparing it to the libraries listed below
- Collection of macOS persistence methods and miscellaneous tools in JXA☆274Updated last year
- Proof of concept MacOS post exploitation tool written in Swift. Designed as a POC for blue teams to build macOS detections. Author: Cedri…☆121Updated 4 years ago
- macOS persistence tool☆224Updated 3 years ago
- macOS Initial Access Payload Generator☆305Updated last year
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆148Updated last year
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆329Updated 3 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆167Updated 5 months ago
- ☆98Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- Encrypted exploit delivery for the masses☆267Updated 5 years ago
- Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods.☆107Updated 2 years ago
- Apfell Golang macOS/Linux/Windows implant☆89Updated 3 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆375Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 6 months ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆369Updated last year
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆146Updated 5 years ago
- Shellcoding utilities☆222Updated 4 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆212Updated 4 years ago
- Neutering Sysmon via driver unload☆228Updated 2 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆381Updated 5 years ago
- PoC☆209Updated 3 months ago
- ☆470Updated last year
- lateral movement techniques that can be used during red team exercises☆271Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆233Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- a tool to make it easy and fast to test various forms of injection☆173Updated 6 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆229Updated 4 years ago
- Evading WinDefender ATP credential-theft☆255Updated 5 years ago