Skip to content

l0psec/arm64_macOS_Syscalls

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

52 Commits
 
 
 
 
 
 

Repository files navigation

arm64 Syscall Examples

This project includes examples of code written in arm64 using syscalls to replicate behvaiors that could be used maliciously.

Behaviors Covered:

  • Launch a shell
  • Add execute permission
  • Create a file
  • Create a directory
  • Remove a directory
  • Print machine uuid
  • Remove extended attribute
  • Permission Check

This is still a work in progress so I plan on adding more along with more ES Event Type mappings.

Instructions to build the example arm64 code

STEP ONE: Download the .s file of choice.

Step Two: Terminal - Use the assembler:

as <arm64Code.s> -o <arm64Output.o>

STEP Three:* Terminal - Use the linker:

ld -o <outputBinaryName> <sourceFileName>.o -lSystem -syslibroot `xcrun -sdk macosx --show-sdk-path` -e _start -arch arm64

Special Thanks to:

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published