AV evading OSX Backdoor and Crypter Framework
This is the first v0.3 Release. The payloads will now be double staged in order to evade av detection. Please keep in mind that i develop on arch and only test on a few platforms so there are sure to be bugs and you should open issues for them. Biggest difference to last release is that this project isnt focused on macOS anymore but on all platforms. It also now features a web server on which the staged payload is stored. I will develop this server into a C2 to which data will be pushed from the victim. With this update the developtment is officially back in progress.
Full Changelog: https://github.com/SubGlitch1/OSRipper/compare/v0.2.3...v0.2.4
Next Release(s):
Full Changelog: https://github.com/SubGlitch1/OSRipper/compare/v0.2.2...v0.2.3 New:
Full Changelog: https://github.com/SubGlitch1/OSRipper/compare/v0.1.6...v0.2.2
New additions:
Trojanised the proccess in this release into pretending to be a system proccess
Full Changelog: https://github.com/SubGlitch1/OSRipper/compare/v0.1.5...v0.1.6
Added crypter support to ssl tcp module
This is the first version i actually redeem as release worthy
Compiled and tested on: Windows 11 64 bit Compiled on pyinstaller
This release was compiled with pyinstaller i compiled and tested it on a macbook m1 arm64
This is the first release. I will publish the binaries for mac and windows as soon as github allows me to lol