[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f6_eKXEcNxnamwUstyzyeGWZyAJkUHvWa6JMEWUxho8w":3},{"id":4,"name":5,"category_id":6,"subcategory_id":7,"uploaded_by":8,"downloads":9,"size":10,"seeders":11,"leechers":12,"infohash":13,"language":14,"title":15,"slogan":15,"poster_alt":16,"description":15,"cover_image":15,"magnet_link":17,"stream_link":16,"content":18,"files":19,"comments_count":20,"tracker_list":21,"date_uploaded":22,"last_checked":22,"last_checked_at":16,"user_id":16,"submit_flag":23,"uploaded_at":24,"created_at":25,"updated_at":25,"slugged_title":26,"category_name":27,"subcategory_name":28,"uploaded_ago":29,"category":30,"subcategory":31,"comments":33},6555812,"Offsec EXP-312: macOS Control Bypasses",9,34,"hazing4864",40541,"903.9 MB",23989,11390,"A29EF40D9CB0D31907FEAA2DC1018202E5E624B6","English","",null,"magnet:?xt=urn:btih:A29EF40D9CB0D31907FEAA2DC1018202E5E624B6&dn=Offsec+EXP-312%3A+macOS+Control+Bypasses&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce&tr=udp%3A%2F%2Feddie4.nl%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Fopentracker.i2p.rocks%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce","\u003Cp>\u003Cdiv class=\"image-progress-wrapper\">\u003Cimg alt=\"Movie cover image\" src=\"https://i.postimg.cc/JhcfGSCT/49bd3ee5769bb6a067a4e87d61117442fc876f55-300x300.jpg\" class=\"img-responsive descrimg\">\u003Cdiv class=\"image-progress-bar\">\u003Cdiv class=\"image-progress-fill\">\u003C/div>\u003C/div>\u003C/div>\u003Cbr>\u003Cbr>\u003Cstrong>Offsec has stopped issuing new certs for this course \u003C/strong>\n\u003Cbr>\u003Cbr>Wayback URL - \u003Ca target=\"_blank\" href=\"https://web.archive.org/web/20250913135159/https://www.offsec.com/courses/exp-312/\">https://web.archive.org/web/20250913135159/https://www.offsec.com/courses/exp-312/\u003C/a>\n\u003Cbr>\u003Cbr>\u003Cbr>Gain a complete understanding of macOS security, including process injection, bypassing security controls, utilizing tools for binary analysis, shellcoding for macOS, and hooking\u003C/p>","\u003Ch2>Files: \u003C/h2>\n                            \u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>EXP-3012\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-book\">\u003C/i>OSMR_EXP312.pdf (18.2 MB)\u003C/li>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>Videos\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>0.EXP312-COPY_00_00-Copyright.mp4 (908.8 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>1.EXP312-Tools_00_00-macOS Binary Analysis Tools.mp4 (6.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>10.EXP312-Tools_03_00-Dynamic Analysis.mp4 (880.2 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>100.EXP312-TCC_03_00-Bypass TCC via Spotlight Importer Plugins.mp4 (536.8 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>101.EXP312-TCC_03_01-The Spotlight Service.mp4 (6.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>102.EXP312-TCC_03_02-Vulnerability Analysis.mp4 (933.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>103.EXP312-TCC_03_03-Exploitation.mp4 (12.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>104.EXP312-TCC_05_00-Gain Full Disk Access via Terminal.mp4 (7.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>105.EXP312-Symlink_03_00-CVE-2020-3855 - macOS DiagnosticMessages File Overwrite Vulnerability.mp4 (23.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>106.EXP312-Symlink_04_00-CVE-2020-3762 - Adobe Reader macOS Installer Local Privilege Escalation.mp4 (14.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>107.EXP312-Symlink_05_00-CVE-2019-8802 - macOS Manpages Local Privilege Escalation.mp4 (15.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>108.EXP312-Kernel_02_00-Sample KEXT.mp4 (9.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>109.EXP312-Kernel_03_00-The KEXT Loading Process.mp4 (4.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>11.EXP312-Tools_04_00-The LLDB Debugger.mp4 (1.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>110.EXP312-Kernel_03_01-Initiating KEXT Load Requests.mp4 (4.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>111.EXP312-Kernel_03_02-Entering kextd.mp4 (8.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>112.EXP312-Kernel_03_03-KEXT Staging.mp4 (15.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>113.EXP312-Kernel_03_04-KEXT Authentication and syspolicyd.mp4 (11.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>114.EXP312-Kernel_03_05-Loading the KEXT Entering XNU.mp4 (5.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>115.EXP312-Kernel_04_00-CVE-2020-9939 - Unsigned KEXT Load Vulnerability.mp4 (631.5 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>116.EXP312-Kernel_04_01-The Vulnerability and the Exploit Plan.mp4 (3.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>117.EXP312-Kernel_04_02-Staging a KEXT with Symlink.mp4 (5.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>118.EXP312-Kernel_04_03-The Insecure Location Problem.mp4 (6.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>119.EXP312-Kernel_04_04-The Race to the Kernel.mp4 (23.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>12.EXP312-Tools_04_01-Setting Breakpoints.mp4 (8.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>120.EXP312-Kernel_04_05-Disabling SIP.mp4 (2.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>121.EXP312-Kernel_05_00-CVE-2021-1779 - Unsigned KEXT Load Vulnerability.mp4 (624.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>122.EXP312-Kernel_05_01-The Patch.mp4 (4.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>123.EXP312-Kernel_05_02-Bypassing Code Signing.mp4 (7.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>124.EXP312-Kernel_05_03-Forget the Race Meet Interactive Mode.mp4 (10.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>125.EXP312-PITA_00_00-macOS Penetration Testing.mp4 (1.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>126.EXP312-PITA_01_00-Small Step For Man.mp4 (7.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>127.EXP312-PITA_02_00-The Jail.mp4 (4.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>128.EXP312-PITA_02_01-Prison Break.mp4 (10.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>129.EXP312-PITA_02_02-Lets Persist.mp4 (5.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>13.EXP312-Tools_04_02-Disassembling with LLDB.mp4 (3.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>130.EXP312-PITA_03_00-I am (g)root.mp4 (426.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>131.EXP312-PITA_03_01-Searching for Low-Hanging Fruit.mp4 (4.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>132.EXP312-PITA_04_00-CVE-2020-26893 - I Like To Move It Move It.mp4 (14.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>133.EXP312-PITA_04_01-Periodic Scripts.mp4 (1.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>134.EXP312-PITA_04_02-PAM Modules.mp4 (5.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>135.EXP312-PITA_04_03-This is the Way.mp4 (13.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>136.EXP312-PITA_05_00-Private Documents - We Wants It We Needs It.mp4 (5.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>137.EXP312-PITA_05_01-CVE-2020-9934 - HOME Relocation.mp4 (9.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>138.EXP312-PITA_06_00-The Core.mp4 (2.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>14.EXP312-Tools_04_03-Reading and Writing Memory and Registers.mp4 (4.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>15.EXP312-Tools_04_04-Modifying Code During Debugging.mp4 (10.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>16.EXP312-Tools_05_00-Debugging with Hopper.mp4 (1.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>17.EXP312-Tools_05_02-Starting the Debugger.mp4 (3.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>18.EXP312-Tools_05_03-Basic Controls and Functionality.mp4 (6.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>19.EXP312-Tools_05_04-Inspecting External Function Resolution.mp4 (5.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>2.EXP312-Tools_01_00-Command Line Static Analysis Tools.mp4 (624.5 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>20.EXP312-Tools_06_00-Tracing Applications with DTrace.mp4 (1.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>21.EXP312-Tools_06_02-DTrace Example - Monitoring System Calls.mp4 (5.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>22.EXP312-Tools_06_03-DTrace Example - Monitoring Write Calls.mp4 (3.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>23.EXP312-Tools_06_04-DTrace Example - Creating Aggregation Info.mp4 (2.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>24.EXP312-Tools_06_05-DTrace Probes.mp4 (1.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>25.EXP312-Tools_06_06-System DTrace Scripts.mp4 (5.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>26.EXP312-Tools_07_00-Wrapping Up.mp4 (896.4 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>27.EXP312-Shellcode_01_03-Making Syscalls from Shellcode.mp4 (6.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>28.EXP312-Shellcode_02_00-Custom Shell Command Execution in Assembly.mp4 (4.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>29.EXP312-Shellcode_02_01-Planned Memory Layout.mp4 (1.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>3.EXP312-Tools_01_01-codesign.mp4 (4.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>30.EXP312-Shellcode_02_02-Putting Arguments on the Stack.mp4 (11.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>31.EXP312-Shellcode_02_03-Setting up the Syscall.mp4 (3.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>32.EXP312-Shellcode_02_04-Putting it Together.mp4 (1.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>33.EXP312-Shellcode_02_05-Analyzing the Shellcode with dtrace.mp4 (3.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>34.EXP312-Shellcode_02_06-Analyzing the Shellcode in a Debugger.mp4 (5.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>35.EXP312-Shellcode_03_00-Making a Bind Shell in Assembly.mp4 (2.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>36.EXP312-Shellcode_03_01-Creating a Socket.mp4 (6.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>37.EXP312-Shellcode_03_02-In the Darkness Bind Them.mp4 (10.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>38.EXP312-Shellcode_03_03-Listening on the Socket.mp4 (3.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>39.EXP312-Shellcode_03_04-Accepting Incoming Connections.mp4 (4.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>4.EXP312-Tools_01_02-objdump.mp4 (8.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>40.EXP312-Shellcode_03_05-Duplicating File Descriptors.mp4 (6.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>41.EXP312-Shellcode_03_06-Executing binzsh.mp4 (2.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>42.EXP312-Shellcode_03_07-Putting the Bind Shell Together.mp4 (11.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>43.EXP312-Shellcode_04_00-Writing Shellcode in C.mp4 (2.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>44.EXP312-Shellcode_04_01-Writing execv Shellcode in C.mp4 (3.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>45.EXP312-Shellcode_04_02-Eliminating RIP Relative Addressing.mp4 (2.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>46.EXP312-Shellcode_04_03-Eliminating Calls into the __stub Section.mp4 (2.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>47.EXP312-Shellcode_04_04-Locating execv Pointer and Running the Code.mp4 (4.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>48.EXP312-Shellcode_05_00-Wrapping Up.mp4 (795.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>49.EXP312-Injection_01_01-Performing an Injection.mp4 (9.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>5.EXP312-Tools_01_03-jtool2.mp4 (4.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>50.EXP312-Injection_01_03-Verifying Restrictions.mp4 (18.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>51.EXP312-Injection_02_02-Dylib Loading Process and Hijacking Scenarios.mp4 (18.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>52.EXP312-Injection_02_03-Finding Vulnerable Applications.mp4 (7.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>53.EXP312-Injection_02_04-Performing Dylib Hijacking.mp4 (7.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>54.EXP312-Injection_02_05-Hijacking Dlopen.mp4 (4.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>55.EXP312-Mach_01_00-Mach Inter Process Communication (IPC) Concepts.mp4 (7.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>56.EXP312-Mach_03_00-Injection via Mach Task Ports.mp4 (1.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>57.EXP312-Mach_03_01-Getting the SEN                        \u003C/li>\u003C/ul>\u003C/ul>",0,"\u003Ch3>\n                                Code:\n                            \u003C/h3>\n                            \u003Cul>\n                                \u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.leechers-paradise.org:6969/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.coppersurfer.tk:6969/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.opentrackr.org:1337/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.zer0day.to:1337/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://eddie4.nl:6969/announce                                    \u003C/li>                            \u003C/ul>","Dec. 29th '25",1,"2025-12-31 05:33:54","2025-12-31T05:33:54.000000Z","offsec-exp-312-macos-control-bypasses","Other","Tutorials","Dec. 31st '25",{"id":6,"name":27},{"id":7,"name":28,"icon":32},"flaticon-tutorial",[]]