Dirty Cow arbitrary file write local privilege escalation exploit for macOS.
2c735a5dbdfd48004da2df38d8a8eed0528ab5199ff9cd6dbf70e890c7786c0c
MAC 1200R suffers from a directory traversal vulnerability.
cc4a576cc94005c55249f862b11f21f974110400ba2bffb27f5d3d1d6e367c9e
286 bytes small macOS/x64 execve Caesar cipher string null-free shellcode.
aa23ac4a240ae6871b72d0723b1c8d4ebded5889ad862b0dd0455f86699c05a2
253 bytes small macOS/x64 execve null-free shellcode.
8b589116ca43d93bd39b3f0f87c1530ec372e055ebb8ddff6b021bf288966dd7
This is a write up demonstrating how to get root on macOS 12.3.1 using CoreTrust and DriverKit bugs. Included is the spawn_root proof of concept.
42264f6011010d1ea9305f22c2f23628b9337624b236c163e1a40b0e1273560f
Macro Expert version 4.7 suffers from an unquoted service path vulnerability.
c53ffdacaf887c5e3bbef8ab750fa2e27d1f78ad6d36aff867e3b82dc9cf39c8
Macaron Notes Great Notebook version 5.5 suffers from a denial of service vulnerability.
31ccde6221360dbafc15dda8126d446f89e959a6e39be1cc7b545e20b88e775f
MacPaw Encrypto version 1.0.1 suffers from an unquoted service path vulnerability.
b5d2d4e435e62adf8936f495f49c69e8a6aa8eb98356b07592b0ca5c404d687c
Macally WIFISD2-2A82 version 2.000.010 guest to root privilege escalation exploit.
d03bcf3ef8c984733b8fb9a20ee042058114eff5ee0f50b675d80934f83db097
Machosec is a script that checks the security of Mach-O 64-bit executables and application bundles for dyld injection vulnerabilities, LC_RPATH vulnerabilities leading to dyld injection, symlinks pointing to attacker controlled locations, writable by others vulnerabilities, missing stack canaries, disabled PIE (ASLR), and disabled FORTIFY_SOURCE (keeping insecure functions such as strcpy, memcpy etc.).
70ca6a3df8488e0268a0db7c2449c2bc9eb3212694506ee5ada98c1deea6a708
macOS version 18.7.0 kernel local privilege escalation exploit that may only work on Macs before 2016.
155c9a77ec71b17b990c29985941fcaf6377273a4a6c13c89f06514c39c675a7
MacOS X versions 10.14.5 and below suffer from a Gatekeeper bypass vulnerability.
76e6187e250514c50b8fb1fa0a230303592e3a59928db823711053d46ba942c4
123 bytes small macOS TCP/4444 /bin/sh binding null free shellcode.
2ae279dcca014cf3fb5d2a1caa2873885ccfdbaea4d0012dccab31d215c3a810
31 bytes small macOS execve(/bin/sh) null free shellcode.
020c83d8d534ce8b9582c5dc0959895b312347181b8dc1d0fea9d37d1498fc43
129 bytes small macOS TCP/4444 binding IPv6 shellcode.
d10f577bae02e2cd55160cc316fbbb711090e08106dd836f13a6c650be8fa06b
119 bytes small macOS reverse shell (::1:4444/TCP) shellcode.
787a14793cff4d048c9818a48103f97dbbf55a2d563e4bef9c5ca8ad60c80f67
103 bytes small macOS reverse (127.0.0.1:4444/TCP) shell (/bin/sh) with null-free shellcode.
e89d3dff82fffaa0aedbffbbabd2f271bbd438e43b6d9f3057b7868ba4bf95d9
macOS version 10.13 workq_kernreturn denial of service proof of concept exploit.
c0d719627a62bd9c9a802343bdd5548be3f38127a565a13b3f7be80e85fae7ca
Apple macOS version 10.13.4 denial of service proof of concept exploit.
190b5816b1b98ed6e8554ca59ef9a677abf88d11217687659e80a0c7584dab6f
Whitepaper called Machine Learning - Learning Cybersecurity.
80ab2d27c57df335948cf2475c2f2b380fa6654de6e16605d2716820f2744441
MACCMS version 10 suffers from a cross site request forgery vulnerability.
6b7622a4509a98cac5c8e1df293fffe6c6b8f2633f9a3498af2d6b03e637ddfa
This is a macOS kernel exploit based on an IOHIDFamily vulnerability.
6ea69ef80ff70cebf65157f4be408a355f3ccb59f4cdf7875c0601be00b560f1
Apple macOS version 10.13.1 (High Sierra) suffers from a cron related local privilege escalation vulnerability that allows you to gain root privileges.
fbe2d99d3b7ef8fd7877306d5456d2c15f9aac738eb9b0ae46533c5eed03251a
macro_pack is a tool used to automate obfuscation and generation of MS Office documents for penetration testing, demo, and social engineering assessments. The goal of macro_pack is to simplify bypassing anti-malware solutions and automate the process from vba generation to final Office document generation.
c5edcba25cf4be512a120d75fc22584e2d4ff925ce78cd23d96e4c714d629695
Apple MacOS disk arbitration daemon race condition exploit.
5e822f89be908a76378c56e9215de59cc184f0164ff3f531107ef63a5defc99b
Macro Expert version 4.0 suffers from multiple privilege escalation vulnerabilities.
a58d108f27dbbcb9826ab807cde340349804f0af2171e8dbf29a67e963befa29