arm64 Syscall Examples

This project includes examples of code written in arm64 using syscalls to replicate behvaiors that could be used maliciously.

Behaviors Covered:

  • Launch a shell
  • Add execute permission
  • Create a file
  • Create a directory
  • Remove a directory
  • Print machine uuid
  • Remove extended attribute
  • Permission Check

This is still a work in progress so I plan on adding more along with more ES Event Type mappings.

Instructions to build the example arm64 code

STEP ONE: Download the .s file of choice.

Step Two: Terminal - Use the assembler:

as <arm64Code.s> -o <arm64Output.o>

STEP Three:* Terminal - Use the linker:

ld -o <outputBinaryName> <sourceFileName>.o -lSystem -syslibroot `xcrun -sdk macosx --show-sdk-path` -e _start -arch arm64

Special Thanks to: