All Projects → jmpews → evilMACHO

jmpews / evilMACHO

Licence: MIT license
Malicious use of macho, such as dump-runtime-macho, function-hook.

Projects that are alternatives of or similar to evilMACHO

HatVenom
HatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (+546.15%)
Mutual labels:  exploit, macho
goMS17-010
Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
Stars: ✭ 67 (+415.38%)
Mutual labels:  exploit
Cloak-And-Dagger
An overlay attack example
Stars: ✭ 22 (+69.23%)
Mutual labels:  exploit
SpringBootExploit
项目是根据LandGrey/SpringBootVulExploit清单编写,目的hvv期间快速利用漏洞、降低漏洞利用门槛。
Stars: ✭ 1,060 (+8053.85%)
Mutual labels:  exploit
HEVD Kernel Exploit
Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.
Stars: ✭ 44 (+238.46%)
Mutual labels:  exploit
ToTheTop
🔝To the top - A small macOS application to help you scroll to the top.
Stars: ✭ 33 (+153.85%)
Mutual labels:  osx
Rage
Rage allows you to execute any file in a Microsoft Office document.
Stars: ✭ 68 (+423.08%)
Mutual labels:  exploit
nocom-explanation
block game military grade radar
Stars: ✭ 544 (+4084.62%)
Mutual labels:  exploit
mac-cleanup-sh
🗑️ Cleanup script for macOS (DEPRECATED)
Stars: ✭ 1,585 (+12092.31%)
Mutual labels:  osx
exploit
My exploitDB.
Stars: ✭ 16 (+23.08%)
Mutual labels:  exploit
dotfiles
No description or website provided.
Stars: ✭ 12 (-7.69%)
Mutual labels:  osx
browserrecon-php
Advanced Web Browser Fingerprinting
Stars: ✭ 29 (+123.08%)
Mutual labels:  exploit
MalwareDatabase
One of the few malware collection
Stars: ✭ 37 (+184.62%)
Mutual labels:  exploit
ronin-exploits
A Ruby micro-framework for writing and running exploits
Stars: ✭ 36 (+176.92%)
Mutual labels:  exploit
redmine tracker
Multi platform application to track time and synchronize it into Redmine.
Stars: ✭ 14 (+7.69%)
Mutual labels:  osx
StudyMD
Flashcards from Markdown. Built with React and Electron
Stars: ✭ 92 (+607.69%)
Mutual labels:  osx
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+5746.15%)
Mutual labels:  exploit
APSoft-Web-Scanner-v2
Powerful dork searcher and vulnerability scanner for windows platform
Stars: ✭ 96 (+638.46%)
Mutual labels:  exploit
Gr33k
图形化漏洞利用集成工具
Stars: ✭ 361 (+2676.92%)
Mutual labels:  exploit
rstpad
Standalone reStructuredText editor with live preview (native app)
Stars: ✭ 35 (+169.23%)
Mutual labels:  osx

evilMACHO

Malicious use of macho, such as dump-runtime-macho, function-hook.

1. evilMACHO/dumpRuntimeMacho

Turn to new project rtspy(runtime-spy)

dump runtime macho file and dyld load address.

such as:

jmpewsde-iPhone:/usr/bin root# ./dumpRuntimeMacho
[*] target pid: 28251
[+] BinLoadAddress: 0x100098000
[*] start dump macho:
[+] macho: Arch-64
    +segment: __PAGEZERO, cmdsize: 48, vmaddr: 0x98000, vmsize: 100000000
    +segment: __TEXT, cmdsize: 228, vmaddr: 0x100098000, vmsize: 8000
      -section: __text, address: 0x10009d7b0, size: 21a0
      -section: __stubs, address: 0x10009f950, size: 174
      -section: __stub_helper, address: 0x10009fac4, size: 174
      -section: __gcc_except_tab__TEXT, address: 0x10009fc38, size: b4
      -section: __cstring, address: 0x10009fcec, size: 222
      -section: __unwind_info, address: 0x10009ff10, size: f0
    +segment: __DATA, cmdsize: 188, vmaddr: 0x1000a0000, vmsize: 4000
      -section: __got, address: 0x1000a0000, size: 30
      -section: __la_symbol_ptr, address: 0x1000a0030, size: f8
      -section: __mod_init_func, address: 0x1000a0128, size: 20
      -section: __bss, address: 0x1000a0148, size: 4
    +segment: __LINKEDIT, cmdsize: 48, vmaddr: 0x1000a4000, vmsize: 2000
[+] string table: 0x1000a4820
[+] symbol table: 0x1000a4de0
[+] dyld path: /usr/lib/dyld
[+] /usr/lib/dyld vm_addr: 0x120000000
[*] start dyld search at 0x120000000
[*] dyld load address check 0x12000c000
[+] macho: Arch-64
[+] DyldImageLoadAddress: 0x12000c000
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].