https://github.com/byt3n33dl3/pymalleasusc2
Pegasus, the Spyware that represents a significant Offensive Colonel.
https://github.com/byt3n33dl3/pymalleasusc2
daily-tasks pegasus pentesting phone spyware surveillance surveillance-systems technology
Last synced: 2 months ago
JSON representation
Pegasus, the Spyware that represents a significant Offensive Colonel.
- Host: GitHub
- URL: https://github.com/byt3n33dl3/pymalleasusc2
- Owner: byt3n33dl3
- License: other
- Created: 2024-03-22T20:23:55.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-06-16T05:49:50.000Z (over 1 year ago)
- Last Synced: 2025-07-19T03:42:46.331Z (3 months ago)
- Topics: daily-tasks, pegasus, pentesting, phone, spyware, surveillance, surveillance-systems, technology
- Language: C
- Homepage:
- Size: 25.8 MB
- Stars: 46
- Watchers: 2
- Forks: 11
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
## [Pegasus](https://github.com/pxcs/pegasus_spyware_1.6/) Spyware
## About Small Sample of [Pegasus](https://github.com/pxcs/pegasus_spyware_1.6/)
Pegasus represents a significant `advancement` in cyber surveillance technology, posing challenges for privacy and security globally. Its capabilities and the controversies surrounding its use highlight the complex interplay between technology, security, and human rights.
### Zero Click Attack & [Exploits](https://www.kaspersky.com/resource-center/definitions/what-is-zero-click-malware)
The spyware can infect a device without any user interaction through "zero-click" exploits, which leverage vulnerabilities in software like messaging apps (e.g., WhatsApp, iMessage).## Pegasus ID
>#### Spyware Identification Utilities - iOS & Android OS
>#### Version 1.6
>#### Date: 2024
## Overview
#### After extensive research and understanding of how `Pegasus` Spyware is operating inside of iOS and Android OS systems I have created tools that will be able to identify & validate the presence of the spyware on mobile devices, and tablets. Initial detection points were derived from the mvt projects.#### These tools do not require your android device to be rooted and you do not have to take a full backup of your iOS device.
>**Background**: I am a professional mobile security engineer, and mobile forensic analyst. I work with human rights groups around the world teaching ethical mobile forensics practices, how to reverse engineer APTs, and how to engineer software and hardware tools to protect against data privacy violations among other things.
>I Developed Mobile & IOT Device ID, Diagnostics, Data Clearing & Validation utilities for publicly traded companies around the world. I have worked with US government agencies, and privately held firms in this same regard.
>For the past 8 years I was contracted to create mobile and IOT backdoors into software, firmware, and hardware.
## AndroidOS
### You will be able to perform
- Kernel Trace Analysis
- Wake Lock Analysis
- Power Monitor Analysis
> Currently I am teaching live phone `hacking` sessions and I will be updating this repository each week.
> Phone Hacking Season.### As of last year Method For Android OS is available
> ### As I continue in the series we will get into
> - iOS
> - WatchOS
> - iPadOS
> - TizenOS
> - WebOS
> - FireOS
> - FlightOS
> - PebbleOS
> - More...### What can this project do for me?
This project gives access to a number of technologies that have previously been "off limits" to developers. Due to being a private and undocumented API, MobileDevice. Pegasus has not been something that can be safely interacted with. This malware `attacks` provides access to:1. Detecting attached iOS devices
2. Querying iOS devices for software and hardware configurations
3. Communication with device services
4. Sandbox access to applications installed on iOS devices
5. Installation of applications onto iOS devices
6. File transfers
## Data AnalysisPending Review.
## Thanks to
#### Author: [Jonathan Scott](https://github.com/jonathandata1/) and some people from [GangstaCrew](https://github.com/GangstaCrew)
For more informations you can check out the repo [**owner**](https://github.com/jonathandata1/)