xpcmdshell / electron-probeLinks
Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron applications. This allows an attacker to extract secrets and manipulate the application as part of their post-exploitation workflow.
☆31Updated 3 weeks ago
Alternatives and similar repositories for electron-probe
Users that are interested in electron-probe are comparing it to the libraries listed below
Sorting:
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Updated 2 years ago
- PoC of macho loading from memory☆58Updated last year
- Golang Shlyuz Implant Implementation☆13Updated 8 months ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- If you have any questions, please open an issue.☆25Updated 3 years ago
- DNS server for pentesters☆50Updated 3 months ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Updated 3 years ago
- ☆15Updated 4 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Updated last year
- AMSI detection PoC☆31Updated 5 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- extracts shellcode from a nasm compile macho binary☆16Updated 5 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Updated 4 years ago
- Execute MachO binaries in memory using CGo☆79Updated 4 years ago
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- ☆24Updated 4 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 6 years ago
- Protect your servers with a secret header☆29Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago
- leaking net-ntlm with webdav☆26Updated 4 years ago
- ☆18Updated 4 years ago