• 设为首页
  • 点击收藏
  • 手机版
    手机扫一扫访问
    迪恩网络手机版
  • 关注官方公众号
    微信扫一扫关注
    迪恩网络公众号

xorrior/macOSTools: macOS Offensive Tools

原作者: [db:作者] 来自: 网络 收藏 邀请

开源软件名称(OpenSource Name):

xorrior/macOSTools

开源软件地址(OpenSource Url):

https://github.com/xorrior/macOSTools

开源编程语言(OpenSource Language):

Objective-C 31.0%

开源软件介绍(OpenSource Introduction):

macOSTools

macOS Offensive Tools

AUnit

Example XCode project for Audio Unit Plugins

MigrationToolPayload

Migration tool plugin

SpecialDelivery

Installer plugin

auth_plugin

Authentication Plugin

dylibinjection

Source code for dylib injection. Based off of code from Jonathan Levin http://newosxbook.com/src.jl?tree=listings&file=inject.c

HIDMan

IOHIDManager keylogger

Script Runners

jxa_runner

Rust library for in-memory JXA execution

Prerequisites

  1. Rust

  2. Mythic JXA Payload. Saved to disk

Build Steps

  1. Use the PAYLOAD and KEY environment variables with cargo build to generate the lib. KEY will be used as a static XOR key.
  2. PAYLOAD=apfell.js KEY=SOMEKEY cargo build --release
  3. Release build is in target/release/libjxa_runner.dylib
  4. For debug versions, a log file is created in /private/tmp/jxa_runner.log
  5. To test, PAYLOAD=apfell.js KEY=SOMEKEY cargo test

python_runner

Rust library for in-memory Python execution

Prerequisites

  1. Rust

  2. Python Payload. Saved to disk

Build Steps

  1. Use the PAYLOAD and KEY environment variables with cargo build to generate the lib. KEY will be used as a static XOR key.
  2. PAYLOAD=medusa.py KEY=SOMEKEY cargo build --release
  3. Release build is in target/release/libpython_runner.dylib
  4. For debug versions, a log file is created in /private/tmp/python_runner.log
  5. To test, PAYLOAD=script.py KEY=SOMEKEY cargo test



鲜花

握手

雷人

路过

鸡蛋
该文章已有0人参与评论

请发表评论

全部评论

专题导读
热门推荐
阅读排行榜

扫描微信二维码

查看手机版网站

随时了解更新最新资讯

139-2527-9053

在线客服(服务时间 9:00~18:00)

在线QQ客服
地址:深圳市南山区西丽大学城创智工业园
电邮:jeky_zhao#qq.com
移动电话:139-2527-9053

Powered by 互联科技 X3.4© 2001-2213 极客世界.|Sitemap