Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Tools for analyzing EDR agents

License

NotificationsYou must be signed in to change notification settings

outflanknl/edr-internals

Repository files navigation

Tools for analyzing EDR agents. For details, see ourblog post.

  • ESDump - macOSEndpoint Security client that dumps events tostdout
  • NEDump - macOScontent filter provider that dumps socket flow data tostdout
  • attacks/phantom_v1 - A collection of POCs that bypass different Linux syscalls using thePhantom V1 TOCTOU vulnerability
  • dump_ebpf.sh - LinuxeBPF program and map enumeration script
  • hook.py -Frida loader withscripts for inspecting key macOS monitoring functions

Usage

  • ESDump and NEDump can be compiled on macOS usingCMakeLists.txt or you can download a precompiledrelease.
    • SIP must bedisabled on the host for ESDump to work.
    • The NEDump app bundle must be copied to/Applications/ to work.
  • Any of the phantom_v1 can be compiled on Linux using theMakefile.
  • To use dump_ebpf.sh,bpftool must be installed.
  • Thefrida Python package is required by hook.py.

Credits


[8]ページ先頭

©2009-2025 Movatter.jp