The document discusses techniques for gaining access and executing code on MacOS and Linux systems while evading detection from security solutions. It describes setting up a Pupy command and control server and generating malicious macro-enabled documents or fake PDFs with AppleScript payloads to deploy a Pupy agent. It also covers challenges with cross-platform security tooling and evading detection from endpoint detection and response systems when executing payloads.
Related topics: