Categories: Kali Linux

EvilOSX – An Evil Remote Administration Tool For MacOS / OS X

EvilOSX is an Evil Remote Administration Tool For MacOS / OS X with the following features like Emulate a terminal instance, Simple extendable module system, No bot dependencies, Undetected by anti-virus, Persistent, GUI and CLI support, Retrieve Chrome passwords, Retrieve iCloud tokens and contacts, Retrieve/monitor the clipboard, Retrieve browser history, Phish for iCloud passwords via iTunes, iTunes (iOS) backup enumeration, Record the microphone, Take a desktop screenshot or picture using the webcam and Attempt to get root via local privilege escalation.

Also Read Autocrack – Hashcat Wrapper To Help Automate The Cracking Process

How To Use EvilOSX

Normal users

  • The server side requires python3 to run.
  • The bot side is written in python2 which is already installed on macOS / OS X.
  • Once python3 is installed, open a terminal and type the following:
# Clone or download this repository
$ git clone https://github.com/Marten4n6/EvilOSX

# Install dependencies required by the server
$ sudo pip3 install -r requirements.txt

# Go into the repository
$ cd EvilOSX

# Start listening for connections
$ python3 start.py

# Lastly, run the built launcher (see the builder tab) on your target(s)

Warning: Because payloads are created unique to the target system (automatically by the server), the server must be running when any bot connects for the first time.

Advanced users

There is also a command line interface for those who want to use this over SSH:

# Create a launcher to infect your target(s)
$ python3 builder.py

# Start listening for connections
$ python3 start.py --cli --port 1337

# Lastly, run the built launcher on your target(s)

Screenshots

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 week ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 week ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago