EvilOSX

RAT

A remote administration tool for macOS designed to provide backdoor access and post-exploitation capabilities.

An evil RAT (Remote Administration Tool) for macOS / OS X.

GitHub

2k stars
111 watching
475 forks
Language: Python
last commit: almost 4 years ago
Linked from 2 awesome lists

backdoormacmacosmacosxosxpentestingpost-exploitationpythonpython3ratreverse-shell

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
evilsocket/opensnitch An interactive application firewall that allows users to filter and manage network connections on GNU/Linux systems. 10,932
hammerspoon/hammerspoon Automates macOS desktop tasks using Lua scripts 12,106
servo/servo An embeddable web rendering engine written in Rust for building fast and memory-safe web browsers. 28,471
alexandreborges/malwoverview An automated tool for threat hunting and malware analysis 2,967
malwaredllc/byob An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence. 8,989
frostming/legit A command-line Git client inspired by GitHub for Mac, designed to simplify Git workflows for both beginners and experienced users. 5,706
sergiotapia/magnetissimo A web application that indexes popular torrent sites and saves magnet links to a local database. 3,001
manisso/fsociety A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment 10,637
n1nj4sec/pupy A cross-platform tool for creating and executing malware payloads in various environments. 8,460
madler/pigz A parallel implementation of the gzip compression algorithm written in C to leverage multiple processors and cores. 2,653
joaomatosf/jexboss A tool for testing and exploiting vulnerabilities in Java-based web applications 2,421
raphamorim/rio A terminal emulator built to run on multiple platforms using hardware acceleration and WebAssembly 3,995
opennhp/opennhp A Zero Trust networking protocol to hide servers and data from attackers by utilizing cryptography at the OSI 5th layer. 13,513
sveinbjornt/platypus Creates native Mac applications from command line scripts 2,836
samyk/poisontap Exploits a locked computer to install a persistent backdoor and expose internal network resources. 6,248