On devices with macOS, malware defenses are structured using the followingApp Store, or Gatekeeper combined with Notarization, and XProtect.| Apple Support
For avoiding EDR userland hooks, there are many ways to cook an egg: Direct system calls (syscalls), Indirect syscalls, unhooking, hardware breakpoints, and bringing and loading your own version of a library. These methods each have advantages and disadvantages. When developing a C2 implant it’s nice to work with a combination of multiple of these. For instance, you could use a strong (in)direct syscall library for direct usermode to kernel transition, then use unhooking or hardware breakpo...| Outflank
Develop system extensions that enhance user security.| Apple Developer Documentation
A detailed step by step introduction to the eBPF technology with lots of references for further reading.| ebpf.io
man7.org > Linux > man-pages| man7.org
man7.org > Linux > man-pages| man7.org
The recent Objective by the Sea v3.0 conference had a lot of great talks. Two that stood out to me were Abusing and Securing XPC in macOS Apps by Wojciech Reguła and Job(s) Bless Us! Privileged Operations on macOS by Julia Vashchenko. Both talks discussed different aspects of XPC services and the types of security bugs that can occur in them. There were some great best practice recommendations that both speakers shared for securing your own XPC services. One of those recommendations was to u...| Scott Knight
man7.org > Linux > man-pages| man7.org