Masochist is a framework for creating XNU based rootkits. Very useful in OS X and iOS security research. It can do cool things like: * Public symbol resolution * Process manipulation * System call hijacking Masochist is currently compatible with 64-bit OS X machines (I think). I've only tested this on 10.10. If anyone is brave enough to try it on their system, I would be very grateful. Usage: To use this code, please import these files into your kernel extension project in Xcode. Then, import the headers that you need to use. I recommend this repo as a starting point for your project. It has been configured and is ready to be built inside Xcode. API docs can be found on the Wiki page. Disclaimer: Please don't do anything stupid/illegal with this. This stuff can break your Mac. If you're unsure, run OS X in a VM.
Common questions about Masochist including features, pricing, alternatives, and user reviews.
Masochist is A framework for creating XNU based rootkits for OS X and iOS security research. It is a Security Operations solution designed to help security teams with Osx, Security Research, IOS.
Masochist is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/squiffy/Masochist/ for download and installation instructions.
Popular alternatives to Masochist include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Masochist is for security teams and organizations that need Osx, Security Research, IOS, Rootkit. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
A collection of security research tools from Google's Project Zero team for testing and analyzing iPhone messaging systems including SMS, iMessage, and IMAP protocols.