Hacking MacOS OS X Using EvilOSX Backdoor: A Remote Administration Tool (RAT) For MacOSX
CLICK HERE ->->->-> https://geags.com/2tvTBq
Hacking macOS OS X using EvilOSX Backdoor: A Remote Administration Tool (RAT) for MacOSX
EvilOSX is an open-source project hosted on GitHub[^1^] that allows hackers to create and deploy a malicious RAT (Remote Administration Tool) for macOS / OS X systems. It is written in pure Python and has no bot dependencies, making it easy to run on any Mac device. It also uses OpenSSL AES-256 encryption to evade antivirus detection.
In this article, we will show you how to use EvilOSX to hack a macOS / OS X system and perform various post-exploitation attacks such as retrieving Chrome passwords, iCloud tokens, browser history, clipboard data, and more. We will also demonstrate how to get root access via local privilege escalation and how to phish for iCloud passwords via iTunes.
Requirements
A Linux system with Python 2.7 installed
A macOS / OS X system to target
An internet connection
A GitHub account (optional)
Step 1: Clone or download EvilOSX from GitHub
The first step is to clone or download the EvilOSX repository from GitHub. You can use the following command to clone it using git:
git clone https://github.com/Marten4n6/EvilOSX
Alternatively, you can download it as a zip file from the GitHub page[^1^]. Once you have the repository on your Linux system, navigate to the EvilOSX directory using cd:
cd EvilOSX
Step 2: Install the dependencies required by the server
The next step is to install the dependencies required by the server. You can use the following command to install them using pip:
sudo pip install -r requirements.txt
This will install the following packages:
Flask
Flask-SocketIO
PyCrypto
Requests
Colorama
PrettyTable
Docker (optional)
Step 3: Start the GUI or CLI server
The third step is to start the server that will communicate with the bots. You can choose between a GUI (Graphical User Interface) or a CLI (Command Line Interface) server. The GUI server provides a web interface that you can access from your browser, while the CLI server provides a terminal interface that you can use over SSH.
To start the GUI server, use the following command:
python start.py
This will launch a web server on port 5000 by default. You can change the port by using the --port option. For example:
python start.py --port 1337
To access the web interface, open your browser and go to http://localhost:5000 (or http://localhost:1337 if you changed the port). You should see something like this:

To start the CLI server, use the following command:
python start.py --cli --port 1337
This will launch a terminal server on port 1337 by default. You can change the port by using the --port option. For example:
python start.py --cli --port 4444
To access the terminal interface, open another terminal and use SSH to connect to your Linux system on port 1337 (or 4444 if you changed the port). For example:
ssh localhost -p 1337
You should see something like this:

Step 4: Create a launcher to infect your target(s)
The fourth step is to create a launcher that will infect your target(s) with EvilOSX. A aa16f39245