Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'macos'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 20 results

  1. Description Apple macOS and iOS System Administration 2022 will teach you how to use Apple’s first party software in conjunction with the popular Mosyle MDM (Mobile Device Management) platform to manage iOS and macOS devices easily and efficiently. If you have familiarity with Apple's operating systems from an end-user perspective but need to manage an organization of macOS or iOS endpoints, this course is for you. This course assumes no experience with system administration on Apple platforms so no prior experience is required. If you are new to system administration or just new to administrating Apple operating systems, this course will introduce you to the basic concepts of managing a handful of devices and scales to how to provide effective support to thousands of devices. The course begins by introducing the basics of Apple hardware and local system management. Tools like Apple Remote Desktop, Screen Time and Apple Configurator are used to demonstrate how to manage a small number of devices. As the course continues, you will be building a cloud-based Mobile Device Management environment using the Mosyle MDM platform. You will learn to configure over-the-air activation and device management for iPhone and iPad endpoints including device restrictions, managed AppleIDs, managed iOS Apps, and more. You will move on to macOS administration and learn to automate software installations, updates, and customize the user experience using configuration profiles. Once you have completed this computer based training course, you will be fully capable of using macOS, Apple Device Enrollment, and Mosyle MDM to administer hundreds or thousands of endpoints across businesses big and small including the enterprise. *Photo by Dmitry Chernyshov on Unsplash Who this course is for: IT Professionals who have to manage some number of Macs or iOS devices. Windows System Administrators who have to support Apple platforms in their environment. Home users who have a number of Apple devices to manage and support with-in their household. [Hidden Content] [hide][Hidden Content]]
  2. Description Hi everyone” – Say hello to an exciting new updated course. Explore redesigned and modern videos. Discover powerful new ways of using macOS Monterey – the newest OS from Apple. MacOS is GREAT … If You can use the whole potential of it, if you know what you’re doing. I’m using Mac computer everyday for more than 10 years and still learning new techniques and shortcuts how to optimise my workflow and I want to share it all with you. When I bought my first MacBook after using Windows for many many years, it took me many hours to learn even basic functionalities in macOS and months before I became entirely comfortable with my Mac. This course will take you from a beginner / intermediate to an advanced macOS user in no time! You’re probably missing out a lot more than you think. I know that because I teach people how to use Mac every day and see how much time they waste in navigation menus, do things old fashioned ways and don’t use quick shortcut keys or just incorrectly use the trackpad. More than 1000 students enrolled in our previous course about macOS Big Sur, now sharing their satisfaction and knowledge. And you can join them right NOW! But I have even better news for you! I have put together brand new up to date course which includes lot more than the previous one. You will find here more than 70 video tutorials covering over 6 hours of video instructions. I don’t want to see people wasting so much time on such a powerful operating system. This course can help you save great amount of time spent on your Mac. Explore a redesigned and modern videos. With improved sound quality and graphics to help you better understand. Each tutorial clearly presents a topic and shows you how to use macOS. You can watch while trying out techniques for yourself. Presented by the appleonlineacademy website dedicated to helping people to understand and use Apple devices to their full potential. This course will be regularly updated and I will be adding more macOS tips as I explore them in new released updates What makes this course different? It has unique graphics which makes video tutorials fresh and not boring It is straight to the point and clear to understand. It includes bonus How to.. section with lot of tips and tricks Course is supported by Downloadable materials I offer full personalised support in Q&A section and also in closed facebook group for enrolled students Who this course is for: NEW USERS who just started using a Mac computer, or for people who switched from Windows to macOS and want to quickly handle all the differences between these operating systems. CURRENT USERS of macOS might find some useful tips and see how old and new features work in Monterey INTERMEDIATE USERS, as they might find some very helpful ways to get certain things done in macOS that they didn’t know about before ADVANCED USERS This course is NOT for those who are already experts at using Macs, as they might know most of these tips already Requirements You should be using a computer running on macOS. The course includes installation guide for a free upgrade to macOS Monterey No other knowledge or experience with macOS needed [Hidden Content] [hide][Hidden Content]]
  3. Feature As in no ads, no time trials, no missing features. Because why not!? And no, it doesn’t track, monitor, or spy on you – as that’d just be pure evil! open-source (non-commercial) The full source code for LuLu is available on GitHub. Such transparency allows anybody to audit its code, or understand exactly what is going on. protects LuLu aims to alert you whenever an unauthorized network connection is attempted. As such, it can generically detect malware, or be used to block legitimate applications that may be transmitting private data to remote servers. simple “Do one thing, do it well!” LuLu is designed as simply as possible. Sure this means complex features may not be available, but it also means it’s easier to use and has a smaller attack surface! enterprise-friendly Want to know what network events are being detected? Or rules your users have added? LuLu provides simple mechanisms subscribe to such events, and stores data such as rules in an open, easily digestible manner. Changelog v2.4 📂 Support for directory rules (/*) #128 📲 New preference added to allow iOS simulator apps #379 [hide][Hidden Content]]
  4. Mystikal Mystikal is a macOS payload generator integrated with Mythic. Mystikal leverages Mythic scripting to log in and creates the necessary payload for the selected initial access method. Mystikal creates an Apfell or Leviathan payload depending on the chosen initial access method. A common payload used for initial access is the installer package. These packages are eXtensible ARchiver (XAR) archives that conform to a specific folder structure and have a .pkg file extension. The easy comparison to Windows would be Windows installers which typically have the .msi file extension. As with Windows installers, installer packages execution typically results in an install wizard presented to the end-user for installation. For offensive use, typical installer package execution relies upon preinstall and postinstall scripts, which are simple bash scripts that execute during the installation process. An alternative method depends upon the abuse of JavaScript within distribution Extensible Markup Language (XML) files using InstallerJS. Apple’s InstallerJS is an Application Programming Interface (API) leveraged in distribution XML files to perform installation checks. Within the InstallerJS API is the system.run tag, which can execute system commands. The Silver Sparrow malware recently used this method. By abusing the distribution XML file, attackers can perform the same tasks typically within preinstall / postinstall scripts. The benefit of this method is that it makes it slightly harder to see what actions the installer package is performing. Additionally, due to the invocation time of the distribution XML file, the installer package does not need to finish the installation process for execution to occur. Changelog v2.2.13 Merge pull request #107 from its-a-feature/2.2-updates added in a few more pages for the new ui, updated mythic-cli to include… [hide][Hidden Content]]
  5. Mystikal is a macOS payload generator integrated with Mythic. Mystikal leverages Mythic scripting to log in and creates the necessary payload for the selected initial access method. Mystikal creates an Apfell or Leviathan payload depending on the chosen initial access method. A common payload used for initial access is the installer package. These packages are eXtensible ARchiver (XAR) archives that conform to a specific folder structure and have a .pkg file extension. The easy comparison to Windows would be Windows installers which typically have the .msi file extension. As with Windows installers, installer packages execution typically results in an install wizard presented to the end-user for installation. For offensive use, typical installer package execution relies upon preinstall and postinstall scripts, which are simple bash scripts that execute during the installation process. An alternative method depends upon the abuse of JavaScript within distribution Extensible Markup Language (XML) files using InstallerJS. Apple’s InstallerJS is an Application Programming Interface (API) leveraged in distribution XML files to perform installation checks. Within the InstallerJS API is the system.run tag, which can execute system commands. The Silver Sparrow malware recently used this method. By abusing the distribution XML file, attackers can perform the same tasks typically within preinstall / postinstall scripts. The benefit of this method is that it makes it slightly harder to see what actions the installer package is performing. Additionally, due to the invocation time of the distribution XML file, the installer package does not need to finish the installation process for execution to occur. [hide][Hidden Content]]
  6. macOS version 18.7.0 kernel local privilege escalation exploit that may only work on Macs before 2016. View the full article
  7. MacOS X versions 10.14.5 and below suffer from a Gatekeeper bypass vulnerability. View the full article
  8. ToRat A Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS clients. Work in Progress... Setup [Hidden Content] Repository The important parts live in Client [Hidden Content] Server [Hidden Content] TLS certificate generator [Hidden Content] Current Features the ToRAT_client communicates over TCP(with TLS) proxied through Tor with the ToRat_server (hidden service) anonymity of client and server end-to-end encryption Cross Platform reverse shell (Windows, Linux, Mac OS) Windows: Multiple User Account Control Bypasses (Privilege escalation) Multiple Persistence methods (User, Admin) optional transport without Tor smaller binary anonymity of client and server embedded Tor Unique persistent ID for every client give a client an Alias all Downloads from client get saved to ./$ID/$filename Server Shell Supports multiple connections Colored Output Tab-Completion of: Commands Files/ Directories in the working directory of the server Command Info select Select client to interact with list list all connected clients alias Select client to give an alias cd change the working directory of the server exit exit the server Shell after selection of a client Tab-Completion of: Commands Files/ Directories in the working directory of the client Command Info cd change the working directory of the client ls list the content of the working directory of the client shred delete files/ directories unrecoverable screen take a Screenshot of the client cat view Textfiles from the client alias give the client a custom alias down download a file from the client up upload a file to the client escape escape a command and run it in a native shell on the client reconnect tell the client to reconnect exit background current session an return to main shell else the command will be executed in a native shell on the client Upcoming Features Persistence and privilege escalation for Linux and Mac OS Support for Android and iOS Cat with support for .docx .pptx .od* .pdf files File-less Persistence on Windows [Hidden Content] ASCII-Art Welcome Message in server shell Download: [Hidden Content]
  9. Apple macOS version 10.13.5 local privilege escalation exploit. View the full article
  10. iOS and MacOS suffer from a kernel heap overflow in PF_KEY due to lack of bounds checking when retrieving statistics. View the full article
  11. iOS and MacOS suffers from sandbox escape vulnerabilities due to type confusions and memory safety issues in iohideventsystem. View the full article
  12. libxpc on MacOS version 10.14.1 suffers from an arbitrary mach port name deallocation in XPC services due to invalid mach message parsing in _xpc_serializer_unpack. View the full article
  13. iOS and macOS suffer from an if_ports_used_update_wakeuuid() 16-byte uninitialized kernel stack disclosure vulnerability. View the full article
  14. task_swap_mach_voucher() on iOS and macOS have an issue where task_swap_mach_voucher() does not respect MIG semantics leading to a use-after-free condition. View the full article
  15. macOS version 10.13 workq_kernreturn denial of service proof of concept exploit. View the full article
  16. SwitchVPN for MacOS and Windows version 2.1012.03 suffers from a man-in-the-middle vulnerability. View the full article
  17. SwitchVPN for MacOS version 2.1012.03 suffers from a privilege escalation vulnerability. View the full article
  18. LiquidVPN for macOS versions 1.3.7 and below suffer from privilege escalation vulnerabilities. View the full article
  19. Apple macOS version 10.13.4 denial of service proof of concept exploit. View the full article
  20. darty

    nmap vs macos

    Hello guys, i dont know if this is the right for make questions.. im trying to discover open ports in macos system, but is not posible. i tried with -sP and mac block the ping.. i tried with others options that i was looking in google and no way... I cant see the opens ports... someone has some idea about? thank you very much.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.