This project includes examples of code written in arm64 using syscalls to replicate behvaiors that could be used maliciously.
Behaviors Covered:
- Launch a shell
- Add execute permission
- Create a file
- Create a directory
- Remove a directory
- Print machine uuid
- Remove extended attribute
- Permission Check
This is still a work in progress so I plan on adding more along with more ES Event Type mappings.
STEP ONE: Download the .s file of choice.
Step Two: Terminal - Use the assembler:
as <arm64Code.s> -o <arm64Output.o>
STEP Three:* Terminal - Use the linker:
ld -o <outputBinaryName> <sourceFileName>.o -lSystem -syslibroot `xcrun -sdk macosx --show-sdk-path` -e _start -arch arm64
Special Thanks to:
- https://github.com/below/HelloSilicon
- HackVlix
- Maria Markstedter for their awesome book.