Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/byt3n33dl3/crackmacexpo

The most advanced GUI frontend && CLI RAT for MacOS and OSX distro, Remote Access Tool. Penetrate the SSL and Security system of Unix with sharp IPA's malware, specialized for Apple. It can also retrieve iCloud Tokens, Contacts, and search engine Passwords History's.
https://github.com/byt3n33dl3/crackmacexpo

crackmacexpo linux macos offensive osx pentesting post-exploitation python3 rat remote-access-tool reverse-shell shellcode

Last synced: about 2 months ago
JSON representation

The most advanced GUI frontend && CLI RAT for MacOS and OSX distro, Remote Access Tool. Penetrate the SSL and Security system of Unix with sharp IPA's malware, specialized for Apple. It can also retrieve iCloud Tokens, Contacts, and search engine Passwords History's.

Awesome Lists containing this project

README

        

# CrackMacExpo

GUI frontend and CLI **RAT**, a Remote Access Tool for **MacOS** or **OSX** distro. Penetrate the SSL and Security system of OSX distro with a sharp IPA's Malware, Specialized for Apple.




MacOS & OSX





License


LPT-Master


Python


Issues


Contributing

# Features
- Emulate a terminal instance
- Simple extendable [Module](https://github.com/Marten4n6/EvilOSX/blob/master/CONTRIBUTING.md) system
- Undetected by Anti Virus ( OpenSSL [AES-256](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) encrypted payloads )
- Persistent
- GUI and CLI support
- Retrieve Chrome passwords
- Retrieve iCloud tokens and contacts
- Monitor the clipboard
- Retrieve browser history ( Chrome and Safari )
- [Phish](https://i.imgur.com/x3ilHQi.png) for iCloud passwords via iTunes
- iTunes ( iOS ) backup enumeration
- Record the microphone
- Take a desktop screenshot or picture using the webcam
- Attempt to get root via local privilege escalation

## How To Use

```python
# Clone or download this repository
$ git clone https://github.com/pxcs/CrackMacExpo

# Go into the repository
$ cd CrackMacExpo

# Install dependencies required by the server
$ sudo pip install -r requirements.txt

# Start the GUI
$ python crackmacexpo.py

# Lastly, run a built launcher on your target(s)
```

**Warning:** Because payloads are created unique to the target system ( Automatically by the server ), the server must be running when any bot connects for the first time.

## Advanced users

There's also a CLI for those who want to use this over SSH:
```python
# Create a launcher to infect your target(s)
$ python crackmacexpo.py --builder

# Start the CLI
$ python crackmacexpo.py --cli --port 443

# Lastly, run a built launcher on your target(s)
```

## Issues
Feel free to submit any issues or feature requests [here](https://github.com/pxcs/CrackMacExpo/issues).

## Contribution
For a simple guide on how to create modules click [here](https://github.com/pxcs/CrackMacExpo).

## Certifications Related

>##### OSMR | Offensive Security macOS Researcher

>##### GXPN | GIAC Exploit Researcher and Advanced Penetration Tester

>##### eCPPT | INE Security Certified Professional Penetration Tester

>##### eCPPTv2 | INE Security Certified Professional Penetration Tester v2

>##### CᴵEH (Master) | Certified Ethical Hacker (Master)

>##### LᴵPT (Master) | Licensed Penetration Tester (Master)

# Credits
- The awesome [Empire](https://github.com/EmpireProject) project
- Shoutout to [Patrick Wardle](https://twitter.com/patrickwardle) for his awesome talks, check out [Objective-See](https://objective-see.com/)
- manwhoami for his projects: OSXChromeDecrypt, MMeTokenDecrypt, iCloudContacts
- The slowloris module is pretty much copied from [PySlowLoris](https://github.com/ProjectMayhem/PySlowLoris)
- [urwid](http://urwid.org/) and this [code](https://github.com/izderadicka/xmpp-tester/blob/master/commander.py) which saved me a lot of time with the CLI
- Logo created by [GangstaCrew](https://www.behance.net/byt3bl33d3r)
- Repo [Marten4n6](https://github.com/Marten4n6/EvilOSX/)

# Contact Me
- [email protected]