 EvilOSX
 EvilOSX 
 RAT
 A remote administration tool for macOS designed to provide backdoor access and post-exploitation capabilities.
An evil RAT (Remote Administration Tool) for macOS / OS X.
2k stars
 111 watching
 478 forks
 
Language: Python 
last commit: over 4 years ago 
Linked from   2 awesome lists  
  backdoormacmacosmacosxosxpentestingpost-exploitationpythonpython3ratreverse-shell 
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | An interactive application firewall that allows users to filter and manage network connections on GNU/Linux systems. | 11,023 | 
|  | Automates macOS desktop tasks using Lua scripts | 12,207 | 
|  | A Rust-based web browser engine with parallel rendering capabilities | 28,713 | 
|  | A tool for analyzing malware and threat intelligence data from multiple sources | 3,012 | 
|  | An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence. | 9,005 | 
|  | A command-line Git client inspired by GitHub for Mac, designed to simplify Git workflows for both beginners and experienced users. | 5,701 | 
|  | A web application that indexes popular torrent sites and saves magnet links to a local database. | 3,008 | 
|  | A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment | 10,698 | 
|  | A cross-platform tool for creating and executing malware payloads in various environments. | 8,490 | 
|  | A parallel implementation of gzip that exploits multiple processors and cores to improve compression performance. | 2,669 | 
|  | A tool for testing and exploiting vulnerabilities in Java-based web applications | 2,429 | 
|  | A terminal emulator built to run on multiple platforms using hardware acceleration and WebAssembly | 4,319 | 
|  | A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers | 13,520 | 
|  | Creates native Mac applications from command line scripts | 2,858 | 
|  | Exploits a locked computer to install a persistent backdoor and expose internal network resources. | 6,268 |