8000 GitHub - SubGlitch1/OSRipper at v0.2.3
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

SubGlitch1/OSRipper

Repository files navigation

Screenshot

CodeFactor

OSripper is a fully undetectable Backdoor generator and Crypter which specialises in OSX M1 malware. It will also work on windows but for now there is no support for it and it IS NOT FUD for windows (yet at least) and for now i will not focus on windows.

Description

Please check the wiki for information on how OSRipper functions

https://github.com/SubGlitch1/OSRipper/wiki

Here are example backdoors which were generated with OSRipper

Screenshot)

Screenshot)

Getting Started

Dependencies

You need python. If you do not wish to download python you can download a compiled release. The python dependencies are specified in the requirements.txt file.

Since Version 1.4 you will need metasploit installed and on path so that it can handle the meterpreter listeners.

Installing

Linux

apt install git python -y
git clone https://github.com/3subs/OSRipper.git
cd OSRipper
pip3 install -r requirements.txt

Windows

git clone https://github.com/3subs/OSRipper.git
cd OSRipper
pip3 install -r requirements.txt

or download the latest release from https://github.com/SubGlitch1/OSRipper/releases/tag/v0.2.1

Executing program

Only this

sudo python3 main.py

Contributing

Please feel free to fork and open pull repuests. Suggestions/critisizm are appreciated as well

Roadmap

v0.1

  • ✅ Get down detection to 0/26 on antiscan.me
  • ✅ Add Changelog
  • ✅ Daemonise Backdoor
  • ✅ Add Crypter
  • ✅ Add More Backdoor templates
  • ✅ Get down detection to at least 0/68 on VT (for mac malware)

v0.2

  • ✅ Add AntiVM
  • [] Implement tor hidden services
  • [] Add Logger
  • ✅ Add Password stealer
  • [] Add KeyLogger
  • [] Add some new evasion options
  • ✅ Add SilentMiner
  • [] Make proper C2 server

Help

Just open a issue and ill make sure to get back to you

Changelog

  • 0.2.1

    • OSRipper will now pull all information from the Target and send them to the c2 server over sockets. This includes information like browser history, passwords, system information, keys and etc.
  • 0.1.6

    • Proccess will now trojanise itself as com.apple.system.monitor and drop to /Users/Shared
  • 0.1.5

    • Added Crypter
  • 0.1.4

    • Added 4th Module
  • 0.1.3

    • Got detection on VT down to 0. Made the Proccess invisible
  • 0.1.2

    • Added 3rd module and listener
  • 0.1.1

    • Initial Release

License

MIT

Acknowledgments

Inspiration, code snippets, etc.

Disclaimer

I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see how easy it is to develop macOS malware.

0