Skip to content

Commit

Permalink
approved
Browse files Browse the repository at this point in the history
  • Loading branch information
darmado committed Sep 15, 2024
2 parents e67447d + 5e15b7d commit 68277a8
Show file tree
Hide file tree
Showing 2 changed files with 137 additions and 2 deletions.
61 changes: 61 additions & 0 deletions .github/workflows/codacy.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,61 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# This workflow checks out code, performs a Codacy security scan
# and integrates the results with the
# GitHub Advanced Security code scanning feature. For more information on
# the Codacy security scan action usage and parameters, see
# https://github.com/codacy/codacy-analysis-cli-action.
# For more information on Codacy Analysis CLI in general, see
# https://github.com/codacy/codacy-analysis-cli.

name: Codacy Security Scan

on:
push:
branches: [ "main" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "main" ]
schedule:
- cron: '17 5 * * 1'

permissions:
contents: read

jobs:
codacy-security-scan:
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
name: Codacy Security Scan
runs-on: ubuntu-latest
steps:
# Checkout the repository to the GitHub Actions runner
- name: Checkout code
uses: actions/checkout@v4

# Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis
- name: Run Codacy Analysis CLI
uses: codacy/codacy-analysis-cli-action@d840f886c4bd4edc059706d09c6a1586111c540b
with:
# Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository
# You can also omit the token and run the tools that support default configurations
project-token: ${{ secrets.CODACY_PROJECT_TOKEN }}
verbose: true
output: results.sarif
format: sarif
# Adjust severity of non-security issues
gh-code-scanning-compat: true
# Force 0 exit code to allow SARIF file generation
# This will handover control about PR rejection to the GitHub side
max-allowed-issues: 2147483647

# Upload the SARIF file generated in the previous step
- name: Upload SARIF results file
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: results.sarif
78 changes: 76 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@

<<<<<<< HEAD

![AttackMacOS_icon](https://github.com/user-attachments/assets/dc7809ab-10bf-46d2-8daf-e706af8ed371)

Expand Down Expand Up @@ -31,9 +32,48 @@ All Attack-macOS scripts use native macOS binaries, interpreters, playlists, lib



=======
>>>>>>> 5e15b7d191f4490016e3081759bb34b193aa3ff2
![AttackMacOS_icon](https://github.com/user-attachments/assets/dc7809ab-10bf-46d2-8daf-e706af8ed371)

<<<<<<< HEAD
=======

# Attack macOS
Attack macOS is a library of scripts mapped to MITRE ATT&CK. Security teams can use Attack-macOS to execute attack techniques and discover new detection opportunities in macOS environments.
##
### **Objective**
This project aims to simplify the execution of Living Off The Land (LOTL) techniques via scripts to validate macOS endpoint security.
</br>
##
### Dependencies

All Attack macOS scripts use native macOS binaries, interpreters, playlists, libraries, tools, and utilities. If third-party tools are installed (```brew```, ```slack```,```jamf```), techniques that leverage third-party apps can be executed.
##

### Technique Coverage
![Reconnaissance](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Reconnaissance?label=Reconnaissance&type=file)
![Resource Development](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Resource_Development?label=Resource%20Development&type=file)
![Initial Access](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Initial_Access?label=Initial%20Access&type=file)
![Execution](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Execution?label=Execution&type=file)
![Persistence](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Persistence?label=Persistence&type=file)
![Privilege Escalation](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Privilege_Escalation?label=Privilege%20Escalation&type=file)
![Defense Evasion](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Defense_Evasion?label=Defense%20Evasion&type=file)
![Credential Access](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Credential_Access?label=Credential%20Access&type=file)
![Discovery](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Discovery?label=Discovery&type=file)
![Lateral Movement](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Lateral_Movement?label=Lateral%20Movement&type=file)
![Collection](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Collection?label=Collection&type=file)
![Command and Control](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Command_and_Control?label=Command%20and%20Control&type=file)
![Exfiltration](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Exfiltration?label=Exfiltration&type=file)
![Impact](https://img.shields.io/github/directory-file-count/darmado/attack-macOS/Impact?label=Impact&type=file)

##

## Key Features

### Key Features

>>>>>>> 5e15b7d191f4490016e3081759bb34b193aa3ff2
- **Template**: Includes a template for creating new scripts.
- **Modular Design**: Each script is self-contained and can be used independently or combined with other scripts.
- **Customizable**: Easy to modify and extend for specific testing needs.
Expand All @@ -44,6 +84,7 @@ All Attack-macOS scripts use native macOS binaries, interpreters, playlists, lib
- **Encryption**: Integrated functions to encrypt output with AES, Blowfish, and GPG.
- **Exfiltration**: Simulated data exfiltration via HTTP or DNS protocols.

<<<<<<< HEAD


## Get started
Expand All @@ -55,13 +96,34 @@ curl -sSL https://raw.githubusercontent.com/darmado/attack-macOS/main/Discovery/
```
For more info, check out our wiki.

=======
##

### Get started

You can execute Attack-macOS scripts from the command line via piped execution or disk. It depends on what telemetry you need to produce. For example:

```sh
curl -sSL https://raw.githubusercontent.com/darmado/attack-macOS/main/Discovery/accounts.sh | sh -s -- --help
```
For more info, check out [Script Execution](https://github.com/darmado/attack-macOS/wiki/Script-Execution.md)
##

## Learn more
### Learn more
>>>>>>> 5e15b7d191f4490016e3081759bb34b193aa3ff2
Wiki is in the works...

<<<<<<< HEAD
Wiki is in the works...

## How to Contribute

=======
##
### How to Contribute

>>>>>>> 5e15b7d191f4490016e3081759bb34b193aa3ff2
Attack-macOS is built as a community development project. Once we add 200+ TTPs, we'll open it up entirely to the community. For now:

- For bugs, feature requests, or suggestions:
Expand All @@ -74,7 +136,13 @@ Attack-macOS is built as a community development project. Once we add 200+ TTPs,
4. Push to the branch (`git push origin feature/AmazingFeature`)
5. Open a Pull Request

<<<<<<< HEAD
## Acknowledgements
=======
##

### Acknowledgements
>>>>>>> 5e15b7d191f4490016e3081759bb34b193aa3ff2
TTPs, attack scenarios, and code snippets are credited in the script's README.

*Special thanks to:*
Expand All @@ -83,8 +151,14 @@ TTPs, attack scenarios, and code snippets are credited in the script's README.
- [Atomic Red Team](https://github.com/redcanaryco/atomic-red-team)
- [The DFIR Report](https://thedfirreport.com/)

<<<<<<< HEAD

## License
=======
##

### License
>>>>>>> 5e15b7d191f4490016e3081759bb34b193aa3ff2
This project is licensed under the Apache License, Version 2.0 - see the [LICENSE](LICENSE) file for details.

0 comments on commit 68277a8

Please sign in to comment.