Masochist Logo

Masochist

A framework for creating XNU based rootkits for OS X and iOS security research

126
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Masochist Description

Masochist is a framework for creating XNU based rootkits. Very useful in OS X and iOS security research. It can do cool things like: * Public symbol resolution * Process manipulation * System call hijacking Masochist is currently compatible with 64-bit OS X machines (I think). I've only tested this on 10.10. If anyone is brave enough to try it on their system, I would be very grateful. Usage: To use this code, please import these files into your kernel extension project in Xcode. Then, import the headers that you need to use. I recommend this repo as a starting point for your project. It has been configured and is ready to be built inside Xcode. API docs can be found on the Wiki page. Disclaimer: Please don't do anything stupid/illegal with this. This stuff can break your Mac. If you're unsure, run OS X in a VM.

Masochist FAQ

Common questions about Masochist including features, pricing, alternatives, and user reviews.

Masochist is A framework for creating XNU based rootkits for OS X and iOS security research. It is a Security Operations solution designed to help security teams with Osx, Security Research, IOS.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Nightwing DejaVM Logo

Whole-system emulation environment for software dev, debugging, testing & security

0
REDLattice Logo

AI-assisted vulnerability research and advanced offensive cyber tooling firm.

0
Two Six Technologies Logo

R&D firm providing cyber defense & operational tech for DoD and DHS.

0
Zenyard RE Agent Logo

AI agent for in-depth binary analysis and reverse engineering assistance.

0
Project Zero iPhone Messaging Tools Logo

A collection of security research tools from Google's Project Zero team for testing and analyzing iPhone messaging systems including SMS, iMessage, and IMAP protocols.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox