https://github.com/byt3n33dl3/icloudcracker
Juggernaut show Attacks for MFA from Apple ID.
Science Score: 13.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
○CITATION.cff file
-
✓codemeta.json file
Found codemeta.json file -
○.zenodo.json file
-
○DOI references
-
○Academic publication links
-
○Academic email domains
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (7.4%) to scientific vocabulary
Keywords
cloud-attack
cracker
credentials
icloud
ios
penetration-testing
Last synced: 5 months ago
·
JSON representation
Repository
Juggernaut show Attacks for MFA from Apple ID.
Basic Info
Statistics
- Stars: 28
- Watchers: 1
- Forks: 4
- Open Issues: 0
- Releases: 1
Topics
cloud-attack
cracker
credentials
icloud
ios
penetration-testing
Created over 1 year ago
· Last pushed over 1 year ago
Metadata Files
Readme
License
README
_ _____ _ _ _____ _
|_| | |___ _ _ _| | |___ ___ ___| |_ ___ ___
| | --| | . | | | . | --| _| .'| _| '_| -_| _|
|_|_____|_|___|___|___|_____|_| |__,|___|_,_|___|_|
Apple ID and Credentials Attack
Disclaimer: Do whatever you want with this code as long as you give me credit (@Pr0x13) & (@pxcs)
Check and make sure its legal in your country to use this tool before doing so.
I'm not responsible for any damage done whatsoever to anyones iCloud account or iDevice.
I Didn't exploit any accounts while writing this, as well i didn't even test it out (Hope it works lol).
I merely observed and reported.
Install:
Put in HtDocs Folder in your Xampp installation.
Install curl for your OS
Navigate to https://github.com/pxcs/iCloudCracker in your web browser (preferably Firefox, Chrome, or Safari).
Wordlist.txt is from iBrute and it satisfies iCloud password Requirements
It's been reported if icloud server responds with an error restart xampp or your computer
-=Reports coming in that Server is now Patched with Rate Limiter=-
-=Server Fully Patched, Discontinue use if you don't want to lock your account!!=-
U S A G E
usage: [-h] [-c] [--mojave] [-b folder]
a script to crack the restriction passcode of an iDevice
optional arguments:
-h, --help show this help message and exit
-c, --cli prompts user for input
-m, --mojave helps user run script on macOS mojave
-b folder, --backup folder
where backups are located
What is this?
A 100% Working iCloud Apple ID Dictionary attack that bypasses
Account Lockout restrictions and Secondary Authentication on any account.
What this isn't:
A bypass or fully automated removal
Why?
This bug is painfully obvious and was only a matter of time before it was
privately used for malicious or nefarious activities, I publicly disclosed it so apple will patch it.
@Pr0x13
@pxcs
Note:
Educational Pusposes Only!
Owner
- Name: Sulaiman
- Login: byt3n33dl3
- Kind: user
- Location: Error 403: Not on earth
- Website: https://byt3n33dl3.substack.com/
- Twitter: byt3n33dl3
- Repositories: 91
- Profile: https://github.com/byt3n33dl3
I N F R A X 8 6
GitHub Events
Total
- Watch event: 12
- Fork event: 4
Last Year
- Watch event: 12
- Fork event: 4
Issues and Pull Requests
Last synced: 10 months ago
All Time
- Total issues: 0
- Total pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Total issue authors: 0
- Total pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0
Past Year
- Issues: 0
- Pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Issue authors: 0
- Pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0