EvilOSX
RAT
A remote administration tool for macOS designed to provide backdoor access and post-exploitation capabilities.
An evil RAT (Remote Administration Tool) for macOS / OS X.
2k stars
111 watching
475 forks
Language: Python
last commit: almost 4 years ago
Linked from 2 awesome lists
backdoormacmacosmacosxosxpentestingpost-exploitationpythonpython3ratreverse-shell
Related projects:
Repository | Description | Stars |
---|---|---|
evilsocket/opensnitch | An interactive application firewall that allows users to filter and manage network connections on GNU/Linux systems. | 10,932 |
hammerspoon/hammerspoon | Automates macOS desktop tasks using Lua scripts | 12,106 |
servo/servo | An embeddable web rendering engine written in Rust for building fast and memory-safe web browsers. | 28,471 |
alexandreborges/malwoverview | An automated tool for threat hunting and malware analysis | 2,967 |
malwaredllc/byob | An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence. | 8,989 |
frostming/legit | A command-line Git client inspired by GitHub for Mac, designed to simplify Git workflows for both beginners and experienced users. | 5,706 |
sergiotapia/magnetissimo | A web application that indexes popular torrent sites and saves magnet links to a local database. | 3,001 |
manisso/fsociety | A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment | 10,637 |
n1nj4sec/pupy | A cross-platform tool for creating and executing malware payloads in various environments. | 8,460 |
madler/pigz | A parallel implementation of the gzip compression algorithm written in C to leverage multiple processors and cores. | 2,653 |
joaomatosf/jexboss | A tool for testing and exploiting vulnerabilities in Java-based web applications | 2,421 |
raphamorim/rio | A terminal emulator built to run on multiple platforms using hardware acceleration and WebAssembly | 3,995 |
opennhp/opennhp | A Zero Trust networking protocol to hide servers and data from attackers by utilizing cryptography at the OSI 5th layer. | 13,513 |
sveinbjornt/platypus | Creates native Mac applications from command line scripts | 2,836 |
samyk/poisontap | Exploits a locked computer to install a persistent backdoor and expose internal network resources. | 6,248 |