xpcmdshell / electron-probeLinks
Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron applications. This allows an attacker to extract secrets and manipulate the application as part of their post-exploitation workflow.
☆31Updated 3 weeks ago
Alternatives and similar repositories for electron-probe
Users that are interested in electron-probe are comparing it to the libraries listed below
Sorting:
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 4 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆34Updated 4 years ago
- Golang Shlyuz Implant Implementation☆13Updated 8 months ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Updated 4 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- If you have any questions, please open an issue.☆25Updated 3 years ago
- AMSI detection PoC☆31Updated 5 years ago
- PoC of macho loading from memory☆58Updated last year
- extracts shellcode from a nasm compile macho binary☆16Updated 5 years ago
- Execute MachO binaries in memory using CGo☆79Updated 4 years ago
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- DNS server for pentesters☆50Updated 3 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Updated 4 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Updated 3 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Updated 3 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- Mimikatz built as a static library.☆12Updated 3 years ago
- ☆24Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Updated 2 years ago
- leaking net-ntlm with webdav☆26Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Updated 8 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- Protect your servers with a secret header☆29Updated 5 years ago
- ☆37Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago