PinnedKarol MazurekSnake&Apple IX — TCCIntroduction to Transparency, Consent, and Control on macOSNov 12Nov 12
PinnedKarol MazurekOptimizing Mach-O DetectionHow to find MachO’s and check their types fast with PythonNov 7Nov 7
PinnedKarol MazurekSystem Integrity Protection (SIP)Introduction to Apple System Integrity Protection on macOSSep 23Sep 23
PinnedKarol MazurekCracking Electron IntegrityHow to patch apps with ElectronAsarIntegrity on macOSJul 20Jul 20
Karol MazurekFixing an Infinite Loop on UnixSymlinks, Firmlinks, /dev, FIFO, and other magic words in Unix5d ago5d ago
Karol MazurekHello Owen, thanks!I looked into that while researching bypasses. I have two observations:Sep 20Sep 20
Karol MazurekSnake&Apple VIII — App SandboxIntroduction to the App Sandbox on macOS with PythonSep 19Sep 19
Karol MazurekApple Gatekeeper BypassTwo ways we can use to deliver malware on macOS silentlySep 161Sep 161