Categories: Kali Linux

EvilOSX – An Evil Remote Administration Tool For MacOS / OS X

EvilOSX is an Evil Remote Administration Tool For MacOS / OS X with the following features like Emulate a terminal instance, Simple extendable module system, No bot dependencies, Undetected by anti-virus, Persistent, GUI and CLI support, Retrieve Chrome passwords, Retrieve iCloud tokens and contacts, Retrieve/monitor the clipboard, Retrieve browser history, Phish for iCloud passwords via iTunes, iTunes (iOS) backup enumeration, Record the microphone, Take a desktop screenshot or picture using the webcam and Attempt to get root via local privilege escalation.

Also Read Autocrack – Hashcat Wrapper To Help Automate The Cracking Process

How To Use EvilOSX

Normal users

  • The server side requires python3 to run.
  • The bot side is written in python2 which is already installed on macOS / OS X.
  • Once python3 is installed, open a terminal and type the following:
# Clone or download this repository
$ git clone https://github.com/Marten4n6/EvilOSX

# Install dependencies required by the server
$ sudo pip3 install -r requirements.txt

# Go into the repository
$ cd EvilOSX

# Start listening for connections
$ python3 start.py

# Lastly, run the built launcher (see the builder tab) on your target(s)

Warning: Because payloads are created unique to the target system (automatically by the server), the server must be running when any bot connects for the first time.

Advanced users

There is also a command line interface for those who want to use this over SSH:

# Create a launcher to infect your target(s)
$ python3 builder.py

# Start listening for connections
$ python3 start.py --cli --port 1337

# Lastly, run the built launcher on your target(s)

Screenshots

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

2 days ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago