Skip to content

Commit

Permalink
Merge branch 'master' into patch-1
Browse files Browse the repository at this point in the history
  • Loading branch information
ashishb authored Jul 23, 2024
2 parents 7f63a81 + c781511 commit 9e59b16
Show file tree
Hide file tree
Showing 7 changed files with 280 additions and 24 deletions.
35 changes: 35 additions & 0 deletions .github/workflows/lint.xml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
# This workflow will download a prebuilt Ruby version, install dependencies and run tests with Rake
# For more information see: https://github.com/marketplace/actions/setup-ruby-jruby-and-truffleruby

name: Lint

on:
push:
branches: [ master ]
pull_request:
branches: [ master ]

jobs:
test:

runs-on: ubuntu-latest

steps:
- uses: actions/checkout@v2
- name: Set up Ruby
# To automatically get bug fixes and new Ruby versions for ruby/setup-ruby,
# change this to (see https://github.com/ruby/setup-ruby#versioning):
# uses: ruby/setup-ruby@v1
uses: ruby/setup-ruby@v1
with:
ruby-version: 2.6
- name: Install dependencies
run: gem install mdl
- name: Run tests
run: |
# Lint - disable some rules - https://github.com/markdownlint/markdownlint/blob/master/docs/RULES.md
mdl -r ~MD013,~MD029,~MD033 README.md
35 changes: 35 additions & 0 deletions .github/workflows/test.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
# This workflow will download a prebuilt Ruby version, install dependencies and run tests with Rake
# For more information see: https://github.com/marketplace/actions/setup-ruby-jruby-and-truffleruby

name: Test

on:
push:
branches: [ master ]
pull_request:
branches: [ master ]

jobs:
test:

runs-on: ubuntu-latest

steps:
- uses: actions/checkout@v2
- name: Set up Ruby
# To automatically get bug fixes and new Ruby versions for ruby/setup-ruby,
# change this to (see https://github.com/ruby/setup-ruby#versioning):
# uses: ruby/setup-ruby@v1
uses: ruby/setup-ruby@v1
with:
ruby-version: 2.6
- name: Install dependencies
run: gem install awesome_bot
- name: Run tests
run: |
# Some URLs could be flaky, try twice in case the first execution fails.
bash run_awesome_bot.sh || bash run_awesome_bot.sh
116 changes: 116 additions & 0 deletions LICENSE
Original file line number Diff line number Diff line change
@@ -0,0 +1,116 @@
CC0 1.0 Universal

Statement of Purpose

The laws of most jurisdictions throughout the world automatically confer
exclusive Copyright and Related Rights (defined below) upon the creator and
subsequent owner(s) (each and all, an "owner") of an original work of
authorship and/or a database (each, a "Work").

Certain owners wish to permanently relinquish those rights to a Work for the
purpose of contributing to a commons of creative, cultural and scientific
works ("Commons") that the public can reliably and without fear of later
claims of infringement build upon, modify, incorporate in other works, reuse
and redistribute as freely as possible in any form whatsoever and for any
purposes, including without limitation commercial purposes. These owners may
contribute to the Commons to promote the ideal of a free culture and the
further production of creative, cultural and scientific works, or to gain
reputation or greater distribution for their Work in part through the use and
efforts of others.

For these and/or other purposes and motivations, and without any expectation
of additional consideration or compensation, the person associating CC0 with a
Work (the "Affirmer"), to the extent that he or she is an owner of Copyright
and Related Rights in the Work, voluntarily elects to apply CC0 to the Work
and publicly distribute the Work under its terms, with knowledge of his or her
Copyright and Related Rights in the Work and the meaning and intended legal
effect of CC0 on those rights.

1. Copyright and Related Rights. A Work made available under CC0 may be
protected by copyright and related or neighboring rights ("Copyright and
Related Rights"). Copyright and Related Rights include, but are not limited
to, the following:

i. the right to reproduce, adapt, distribute, perform, display, communicate,
and translate a Work;

ii. moral rights retained by the original author(s) and/or performer(s);

iii. publicity and privacy rights pertaining to a person's image or likeness
depicted in a Work;

iv. rights protecting against unfair competition in regards to a Work,
subject to the limitations in paragraph 4(a), below;

v. rights protecting the extraction, dissemination, use and reuse of data in
a Work;

vi. database rights (such as those arising under Directive 96/9/EC of the
European Parliament and of the Council of 11 March 1996 on the legal
protection of databases, and under any national implementation thereof,
including any amended or successor version of such directive); and

vii. other similar, equivalent or corresponding rights throughout the world
based on applicable law or treaty, and any national implementations thereof.

2. Waiver. To the greatest extent permitted by, but not in contravention of,
applicable law, Affirmer hereby overtly, fully, permanently, irrevocably and
unconditionally waives, abandons, and surrenders all of Affirmer's Copyright
and Related Rights and associated claims and causes of action, whether now
known or unknown (including existing as well as future claims and causes of
action), in the Work (i) in all territories worldwide, (ii) for the maximum
duration provided by applicable law or treaty (including future time
extensions), (iii) in any current or future medium and for any number of
copies, and (iv) for any purpose whatsoever, including without limitation
commercial, advertising or promotional purposes (the "Waiver"). Affirmer makes
the Waiver for the benefit of each member of the public at large and to the
detriment of Affirmer's heirs and successors, fully intending that such Waiver
shall not be subject to revocation, rescission, cancellation, termination, or
any other legal or equitable action to disrupt the quiet enjoyment of the Work
by the public as contemplated by Affirmer's express Statement of Purpose.

3. Public License Fallback. Should any part of the Waiver for any reason be
judged legally invalid or ineffective under applicable law, then the Waiver
shall be preserved to the maximum extent permitted taking into account
Affirmer's express Statement of Purpose. In addition, to the extent the Waiver
is so judged Affirmer hereby grants to each affected person a royalty-free,
non transferable, non sublicensable, non exclusive, irrevocable and
unconditional license to exercise Affirmer's Copyright and Related Rights in
the Work (i) in all territories worldwide, (ii) for the maximum duration
provided by applicable law or treaty (including future time extensions), (iii)
in any current or future medium and for any number of copies, and (iv) for any
purpose whatsoever, including without limitation commercial, advertising or
promotional purposes (the "License"). The License shall be deemed effective as
of the date CC0 was applied by Affirmer to the Work. Should any part of the
License for any reason be judged legally invalid or ineffective under
applicable law, such partial invalidity or ineffectiveness shall not
invalidate the remainder of the License, and in such case Affirmer hereby
affirms that he or she will not (i) exercise any of his or her remaining
Copyright and Related Rights in the Work or (ii) assert any associated claims
and causes of action with respect to the Work, in either case contrary to
Affirmer's express Statement of Purpose.

4. Limitations and Disclaimers.

a. No trademark or patent rights held by Affirmer are waived, abandoned,
surrendered, licensed or otherwise affected by this document.

b. Affirmer offers the Work as-is and makes no representations or warranties
of any kind concerning the Work, express, implied, statutory or otherwise,
including without limitation warranties of title, merchantability, fitness
for a particular purpose, non infringement, or the absence of latent or
other defects, accuracy, or the present or absence of errors, whether or not
discoverable, all to the greatest extent permissible under applicable law.

c. Affirmer disclaims responsibility for clearing rights of other persons
that may apply to the Work or any use thereof, including without limitation
any person's Copyright and Related Rights in the Work. Further, Affirmer
disclaims responsibility for obtaining any necessary consents, permissions
or other rights required for any use of the Work.

d. Affirmer understands and acknowledges that Creative Commons is not a
party to this document and has no duty or obligation with respect to this
CC0 or use of the Work.

For more information, please see
<http://creativecommons.org/publicdomain/zero/1.0/>
6 changes: 6 additions & 0 deletions Makefile
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
lint:
mdl -r ~MD013,~MD029,~MD033 README.md

test:
# Some URLs could be flaky, try twice in case the first execution fails.
bash run_awesome_bot.sh || bash run_awesome_bot.sh
84 changes: 60 additions & 24 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,23 +1,48 @@
OSX security related tools
====================

1. [OSX collector](https://github.com/Yelp/OSXCollector) - for forensic analysis
2. [MIDAS](https://github.com/etsy/MIDAS) - Mac Intrusion Detection Analysis System
3. [OSX auditor](https://github.com/jipegit/OSXAuditor) - for forensic analysis
4. [Santa](https://github.com/google/santa) - binary whitelisting/blacklisting system
5. [Masochist](https://github.com/squiffy/Masochist) - framework for creating XNU based rootkits
6. [Class-dump](http://stevenygard.com/projects/class-dump/) - command-line utility to dump Objective-C runtime information
7. [Mach inject](https://github.com/rentzsch/mach_inject) - Inter process code injection for Mac OS X
8. [Task vaccine](https://github.com/rodionovd/task_vaccine) - similar to mach inject
8. [Hopper](http://www.hopperapp.com/) - Hopper disassembler (not free)
9. [Mach-O diff](https://github.com/samdmarshall/machodiff) - mach-o diffing tool
10. [Mac4n6](https://github.com/pstirparo/mac4n6) - A collection of OS X and iOS forensic artifacts
11. [XGuardian scanner](https://github.com/openscanner/XGuardian) - Security Scanner for OSX
12. [Crashwalk](https://github.com/bnagy/crashwalk)
13. [PassiveFuzzFrameworks](https://github.com/SilverMoonSecurity/PassiveFuzzFrameworkOSX)

iOS security related tools
====================
# macOS and iOS Security Related Tools [![Awesome](https://awesome.re/badge-flat.svg)](https://awesome.re) <a href="https://github.com/ashishb/osx-and-ios-security-awesome/actions">![Test](https://github.com/ashishb/osx-and-ios-security-awesome/workflows/Test/badge.svg)</a>

## Contents

- [macOS Security](#macos-security)
- [iOS Security](#ios-security)
- [iOS Jailbreaks](#ios-jailbreaks)

## macOS Security

1. [OSX collector](https://github.com/Yelp/OSXCollector) - Forensic analysis.
2. [OSX auditor](https://github.com/jipegit/OSXAuditor) - Forensic analysis.
3. [mac_apt](https://github.com/ydkhatri/mac_apt) - macOS Artifact Parsing Tool for forensic analysis.
4. [MIDAS](https://github.com/etsy/MIDAS) - macOS Intrusion Detection Analysis System.
5. [Santa](https://github.com/google/santa) - Binary whitelisting/blacklisting system.
6. [Masochist](https://github.com/squiffy/Masochist) - Framework for creating XNU based rootkits.
7. [Class-dump](http://stevenygard.com/projects/class-dump/) - Command-line utility to dump Objective-C runtime information.
8. [Mach inject](https://github.com/rentzsch/mach_inject) - Inter process code injection for macOS.
9. [Task vaccine](https://github.com/rodionovd/task_vaccine) - Similar to mach inject.
10. [Hopper](http://www.hopperapp.com/) - Hopper disassembler (not free).
11. [Mach-O diff](https://github.com/samdmarshall/machodiff) - Mach-o diffing tool.
12. [Mac4n6](https://github.com/pstirparo/mac4n6) - A collection of macOS and iOS forensic artifacts.
13. [XGuardian scanner](https://github.com/openscanner/XGuardian) - Security Scanner for macOS.
14. [Crashwalk](https://github.com/bnagy/crashwalk) - Bucket and triage on-disk crashes
15. [PassiveFuzzFrameworks](https://github.com/SilverMoonSecurity/PassiveFuzzFrameworkOSX)
16. [osquery](https://github.com/facebook/osquery) - Cross-platform tool for data collection and forensic analysis.
17. [stronghold](https://github.com/alichtman/stronghold) - Easily configure macOS security settings from the terminal.
18. [BlockBlock](https://objective-see.com/products/blockblock.html) - BlockBlock continually monitors common persistence locations and displays an alert whenever a persistent component is added to the OS.
19. [Dylib Hijack Scanner](https://objective-see.com/products/dhs.html) - Simple utility that will scan your computer for applications that are either susceptible to dylib hijacking or have been hijacked.
20. [KextViewer](https://objective-see.com/products/kextviewr.html) - View all modules on that are loaded in the OS kernel.
21. [KnockKnock](https://objective-see.com/products/knockknock.html) - See what's persistently installed on your Mac.
22. [LinkLiar](http://halo.github.io/LinkLiar) - Link-Layer MAC spoofing GUI for macOS.
23. [LockDown](https://objective-see.com/products/lockdown.html) - Open-source tool for El Capitan that audits and remediates security configuration settings.
24. [MalwareBytes](https://www.malwarebytes.com/mac-download/) - Malwarebytes crushes the growing threat of Mac malware, so you are protected and your machine keeps running silky smooth. Cybersecurity smart enough for the Mac.
25. [OverSight](https://objective-see.com/products/oversight.html) - Monitor mic and webcam, alerting you when the internal mic is activated, or whenever a process accesses the webcam.
26. [RansomWhere?](https://objective-see.com/products/ransomwhere.html) - Ransomware Detection.
27. [TaskExplorer](https://objective-see.com/products/taskexplorer.html) - Explore all processes running on your Mac with TaskExplorer.
28. [What's Your Sign?](https://objective-see.com/products/whatsyoursign.html) - Adds menu item to Finder.app to display the cryptographic signing information for any file.
29. [FSMonitor](http://fsmonitor.com/) - Monitor all changes in the file system.
30. [Pareto Security](https://github.com/paretoSecurity/pareto-mac/) - A MenuBar app to automatically audit your Mac for basic security hygiene.
31. [Mana Security](https://github.com/manasecurity/mana-security-app) - Vulnerability Management app for individuals. It helps to keep macOS and installed applications updated.
32. [swiftGuard](https://github.com/Lennolium/swiftGuard) - Lightweight App that safeguards your System's USB Ports from any Unauthorized Access and performs various Counter-Measures.
33. [Pareto Security](https://paretosecurity.app/) - A MenuBar app to automatically audit your Mac for basic security hygiene.

## iOS Security

A collection of ios security related resources

Expand All @@ -26,12 +51,23 @@ A collection of ios security related resources
3. [DVIA](http://damnvulnerableiosapp.com/) - Damn Vulnerable iOS App for learning
4. [LibiMobileDevice](https://github.com/libimobiledevice/libimobiledevice) - A cross-platform protocol library to communicate with iOS devices
5. [Needle](https://github.com/mwrlabs/needle) - iOS App Pentesting Tool
6. [NowSecure Lab Automated](https://www.nowsecure.com/blog/2016/09/19/announcing-nowsecure-lab-automated/) - Enterprise tool for mobile app security testing both iOS and Android mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes.
6. [imobax](https://github.com/Siguza/imobax) - iOS Mobile Backup Extractor
7. [iMessage Fuzzing](https://github.com/googleprojectzero/iOS-messaging-tools) - iMessage fuzzing tools from Google's Project Zero
8. [Themis](https://github.com/cossacklabs/themis) - a multi-platform programming library for solving typical data security tasks: secure data storage, secure messaging, zero-knowledge proof authentication, etc. Recommended by OWASP MASVS.
9. [NowSecure Lab Automated](https://www.nowsecure.com/blog/2016/09/19/announcing-nowsecure-lab-automated/) - Enterprise tool for mobile app security testing both iOS and Android mobile apps. Lab Automated features dynamic and static analysis on real devices in the cloud to return results in minutes.
10. ~~[AppCritique](https://appcritique.boozallen.com) - iOS App Security Assessment Tool~~

## iOS Jailbreaks

1. [PhoenixPwn](https://phoenixpwn.com) - Jailbreak for 9.3.5 32-bit devices.

### Other Awesome Lists

# Other Awesome Lists
Other amazingly awesome lists can be found in the
[awesome-awesomeness](https://github.com/bayandin/awesome-awesomeness) list.

# Contributing
Your contributions are always welcome!
---

## License

<a rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/"><img alt="Creative Commons License" style="border-width:0" src="https://licensebuttons.net/l/by-sa/4.0/88x31.png" /></a><br />This work is licensed under a <a rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/">Creative Commons Attribution-ShareAlike 4.0 International License</a>.
15 changes: 15 additions & 0 deletions contributing.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
# Contribution Guidelines

Please ensure your pull request adheres to the following guidelines:

- Search previous suggestions before making a new one, as yours may be a duplicate.
- Make sure your entries is useful before submitting.
- Make an individual pull request for each suggestion.
- Titles should be [capitalized](http://grammar.yourdictionary.com/capitalization/rules-for-capitalization-in-titles.html).
- Link additions should be added to the bottom of the relevant category.
- New categories or improvements to the existing categorization are welcome.
- Check your spelling and grammar.
- Make sure your text editor is set to remove trailing whitespace.
- The pull request and commit should have a useful title.

Thank you for your suggestions!
13 changes: 13 additions & 0 deletions run_awesome_bot.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
#!/usr/bin/env bash
set -euxo pipefail

# objective-see.com gets 403 on CI. Probably due to some IP blacklist.
DEAD_URLS='objective-see.com','appcritique.boozallen.com'
SRC_FILE=README.md
awesome_bot \
--allow-redirect \
--allow-ssl \
--allow-dupe \
--skip-save-results \
--white-list ${DEAD_URLS} \
--files ${SRC_FILE}

0 comments on commit 9e59b16

Please sign in to comment.