https://github.com/byt3n33dl3/pymalleasusc2

Pegasus, the Spyware that represents a significant Offensive Colonel.

https://github.com/byt3n33dl3/pymalleasusc2

Science Score: 13.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
  • DOI references
  • Academic publication links
  • Committers with academic emails
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (9.5%) to scientific vocabulary

Keywords

daily-tasks pegasus pentesting phone spyware surveillance surveillance-systems technology
Last synced: 5 months ago · JSON representation

Repository

Pegasus, the Spyware that represents a significant Offensive Colonel.

Basic Info
  • Host: GitHub
  • Owner: byt3n33dl3
  • License: other
  • Language: C
  • Default Branch: main
  • Homepage:
  • Size: 25.8 MB
Statistics
  • Stars: 56
  • Watchers: 2
  • Forks: 16
  • Open Issues: 1
  • Releases: 0
Topics
daily-tasks pegasus pentesting phone spyware surveillance surveillance-systems technology
Created almost 2 years ago · Last pushed over 1 year ago
Metadata Files
Readme License

README.md

Pegasus Spyware

About Small Sample of Pegasus

Pegasus represents a significant advancement in cyber surveillance technology, posing challenges for privacy and security globally. Its capabilities and the controversies surrounding its use highlight the complex interplay between technology, security, and human rights.

Zero Click Attack & Exploits

The spyware can infect a device without any user interaction through "zero-click" exploits, which leverage vulnerabilities in software like messaging apps (e.g., WhatsApp, iMessage).

Pegasus ID

Spyware Identification Utilities - iOS & Android OS

Version 1.6

Date: 2024

Overview

After extensive research and understanding of how Pegasus Spyware is operating inside of iOS and Android OS systems I have created tools that will be able to identify & validate the presence of the spyware on mobile devices, and tablets. Initial detection points were derived from the mvt projects.

These tools do not require your android device to be rooted and you do not have to take a full backup of your iOS device.

Background: I am a professional mobile security engineer, and mobile forensic analyst. I work with human rights groups around the world teaching ethical mobile forensics practices, how to reverse engineer APTs, and how to engineer software and hardware tools to protect against data privacy violations among other things.

I Developed Mobile & IOT Device ID, Diagnostics, Data Clearing & Validation utilities for publicly traded companies around the world. I have worked with US government agencies, and privately held firms in this same regard.

For the past 8 years I was contracted to create mobile and IOT backdoors into software, firmware, and hardware.

AndroidOS

You will be able to perform

  • Kernel Trace Analysis
  • Wake Lock Analysis
  • Power Monitor Analysis

Currently I am teaching live phone hacking sessions and I will be updating this repository each week. Phone Hacking Season.

As of last year Method For Android OS is available

### As I continue in the series we will get into - iOS - WatchOS - iPadOS - TizenOS - WebOS - FireOS - FlightOS - PebbleOS - More...

What can this project do for me?

This project gives access to a number of technologies that have previously been "off limits" to developers. Due to being a private and undocumented API, MobileDevice. Pegasus has not been something that can be safely interacted with. This malware attacks provides access to:

  1. Detecting attached iOS devices
  2. Querying iOS devices for software and hardware configurations
  3. Communication with device services
  4. Sandbox access to applications installed on iOS devices
  5. Installation of applications onto iOS devices
  6. File transfers

Data Analysis

Pending Review.

Thanks to

Author: Jonathan Scott and some people from GangstaCrew

For more informations you can check out the repo owner

Owner

  • Name: Sulaiman
  • Login: byt3n33dl3
  • Kind: user
  • Location: Error 403: Not on earth

I N F R A X 8 6

GitHub Events

Total
  • Issues event: 1
  • Watch event: 34
  • Fork event: 9
Last Year
  • Issues event: 1
  • Watch event: 34
  • Fork event: 9

Committers

Last synced: 7 months ago

All Time
  • Total Commits: 60
  • Total Committers: 2
  • Avg Commits per committer: 30.0
  • Development Distribution Score (DDS): 0.4
Past Year
  • Commits: 0
  • Committers: 0
  • Avg Commits per committer: 0.0
  • Development Distribution Score (DDS): 0.0
Top Committers
Name Email Commits
p3xsouger s****9@g****m 36
p3xsouger 1****l 24

Issues and Pull Requests

Last synced: 7 months ago

All Time
  • Total issues: 1
  • Total pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Total issue authors: 1
  • Total pull request authors: 0
  • Average comments per issue: 0.0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Past Year
  • Issues: 1
  • Pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Issue authors: 1
  • Pull request authors: 0
  • Average comments per issue: 0.0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Top Authors
Issue Authors
  • 0rph4n31 (1)
Pull Request Authors
Top Labels
Issue Labels
Pull Request Labels