Categories: Kali Linux

EvilOSX – An Evil Remote Administration Tool For MacOS / OS X

EvilOSX is an Evil Remote Administration Tool For MacOS / OS X with the following features like Emulate a terminal instance, Simple extendable module system, No bot dependencies, Undetected by anti-virus, Persistent, GUI and CLI support, Retrieve Chrome passwords, Retrieve iCloud tokens and contacts, Retrieve/monitor the clipboard, Retrieve browser history, Phish for iCloud passwords via iTunes, iTunes (iOS) backup enumeration, Record the microphone, Take a desktop screenshot or picture using the webcam and Attempt to get root via local privilege escalation.

Also Read Autocrack – Hashcat Wrapper To Help Automate The Cracking Process

How To Use EvilOSX

Normal users

  • The server side requires python3 to run.
  • The bot side is written in python2 which is already installed on macOS / OS X.
  • Once python3 is installed, open a terminal and type the following:
# Clone or download this repository
$ git clone https://github.com/Marten4n6/EvilOSX

# Install dependencies required by the server
$ sudo pip3 install -r requirements.txt

# Go into the repository
$ cd EvilOSX

# Start listening for connections
$ python3 start.py

# Lastly, run the built launcher (see the builder tab) on your target(s)

Warning: Because payloads are created unique to the target system (automatically by the server), the server must be running when any bot connects for the first time.

Advanced users

There is also a command line interface for those who want to use this over SSH:

# Create a launcher to infect your target(s)
$ python3 builder.py

# Start listening for connections
$ python3 start.py --cli --port 1337

# Lastly, run the built launcher on your target(s)

Screenshots

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

15 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

15 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

15 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

15 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

16 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

18 hours ago