Lists (32)
Sort Name ascending (A-Z)
ADVERSARY LANGUAGES
Alternative programming languages used by adversaries5 repositories
AI
27 repositories
APP
127 repositories
C2:Loaders
4 repositories
CHEAT SHEETS
20 repositories
COLLECTION
6 repositories
COMMAND & CONTROL
List of C2 projects we've used at least once during assumed breach, threat emulation, and purple team exercise work.56 repositories
CREDENTIAL ACCESS
44 repositories
CTI ANALYSIS
Tools for automating CTI analysis42 repositories
DEFENSE EVASION
111 repositories
DEVSEC OPS
All things DevSecOps38 repositories
DISCOVERY
48 repositories
EXECUTION
8 repositories
EXFILTRATION
4 repositories
INITIAL ACCESS
17 repositories
LATERAL MOVEMENT
11 repositories
LEARNING
2 repositories
MacOS
22 repositories
MALDOC
8 repositories
MOBILE
1 repository
OSINT
7 repositories
PERSISTENCE
12 repositories
PIPELINES
2 repositories
PRIVILEGE ESCALATION
37 repositories
RANSOMWARE SIM
5 repositories
RECON
26 repositories
REPORTING
2 repositories
SMART CONTRACT TOOLS
6 repositories
TOOLS
This list includes offensive operations tooling that includes many TTPs50 repositories
TTP
3 repositories
VULN ANALYSIS
4 repositories
WEB APPS
Open source web apps1 repository
Stars
7
stars
written in Swift
Clear filter
Simple Swift wrapper for Keychain that works on iOS, watchOS, tvOS and macOS.
"The missing ProcMon for macOS": Mac Monitor records Endpoint Security events and displays them for analysis.
A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens
Take over macOS Electron apps' TCC permissions
Scripts (python3 and Swift) for macOS to recursively check /Applications and also check /usr/local/bin, /usr/bin, and /usr/sbin for binaries with problematic/interesting entitlements. Also checks f…
Swift code to programmatically perform dylib injection