• Stars
    star
    381
  • Rank 112,502 (Top 3 %)
  • Language
    Python
  • License
    MIT License
  • Created 11 months ago
  • Updated 3 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.

logo

Developer Language Forks Stars CodeFactor

SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.

Features

  • IPA generator - All you need to do is generate an IPA file and install it on a target's device via TrollStore or other IPA installer that bypasses CoreTrust. After app was installed, a target simply need to run an app single time (he may close application completely after this).
  • Powerful Implant - SeaShell Framework uses the advanced and powerful payload with lots of features. It is called Pwny. You can extend it by adding your own post-exploitation modules or plugins.
  • Basic Set - SeaShell Framework comes with basic set of post-exploitation modules that may exfiltrate following user data: SMS, VoiceMail, Safari history and much more.
  • Encrypted communication - Communication between device and SeaShell is encrypted using the TLS 1.3 encryption by default.
  • Regular updates - SeaShell Framework is being actively updated, so don't hesitate and leave your feature request!

Installation

To install SeaShell Framework you just need to type this command in your terminal:

pip3 install git+https://github.com/EntySec/SeaShell

After this SeaShell can be started with seashell command.

Updating

To update SeaShell and get new commands run this:

pip3 install --force-reinstall git+https://github.com/EntySec/SeaShell

Usage

Generating IPA

Simply generate custom IPA file or patch existing one and install it on target's iPhone or iPad via TrollStore or other IPA installer that bypasses CoreTrust.

Starting listener

Then you will need to start a listener on a host and port you added to your IPA. Once the installed application opens, you will receive a connection.

Accessing device

Once you have received the connection, you will be able to communicate with the session through a Pwny interactive shell. Use devices -i <id> to interact and help to view list of all available commands. You can even extract Safari history like in the example below.

Covering them All

Wide range of iOS versions are supported, since all of them are vulnerable to CoreTrust bug. They can be iOS 14, 15, 16 or early 17.

Endless Capabilities

Pwny is a powerful implant with plenty of features including evasion, dynamic extensions and much more. It is embedded into the second phase of SeaShell Framework attack. These are all phases:

  • 1. IPA file installed and opened.
  • 2. Pwny is loaded through posix_spawn().
  • 3. Connection established and Pwny is ready to receive commands.

Issues and Bugs

SeaShell was just released and is in BETA stage for now. If you find a bug or some function that does not work we will be glad if you immediately submit an issue describing a problem. The more details the issue contains the faster we will be able to fix it.

External Resources

Legal Use

Note that the code and methods provided in this repository must not be used for malicious purposes and should only be used for testing and experimenting with devices you own. Please consider out Terms of Service before using the tool.

More Repositories

1

Ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Python
2,711
star
2

RomBuster

RomBuster is a router exploitation tool that allows to disclosure network router admin password.
Python
461
star
3

CamOver

CamOver is a camera exploitation tool that allows to disclosure network camera admin password.
Python
434
star
4

HatSploit

Modular penetration testing platform that enables you to write, test, and execute exploit code.
Python
272
star
5

CamRaptor

CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
Python
209
star
6

Shreder

Shreder is a powerful multi-threaded SSH protocol password brute-force tool.
Python
196
star
7

HatVenom

HatVenom is a powerful payload generation tool that provides support for all common platforms and architectures.
Python
128
star
8

Pwny

Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.
C
45
star
9

Pex

Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.
Python
43
star
10

Checkmate

Powerful advanced web platform for C2 managing and automated penetration testing.
14
star
11

HatAsm

HatAsm is a powerful assembler and disassembler that provides support for all common architectures.
Python
14
star
12

Pawn

Pawn is a collection of Python techniques used for crafting, manipulating and injecting payloads.
Python
12
star
13

HatBoard

HatBoard is a HatSploit Framework web interface for executing attacks, handling and manipulating sessions and traffic.
CSS
10
star
14

libpawn

C library that is intended for providing methods for executing and injecting code.
C
10
star
15

ictl

Pwny plugin that allows to manipulate some user interface features available on Apple iOS.
C
6
star
16

ColorScript

ColorScript is a scripting language for designing custom ASCII banners.
Python
5
star
17

HatLoads

HatLoads is a HatSploit collection of generic payloads designed to provide a wide range of attacks without having to spend time writing new ones.
Python
5
star
18

Badges

Badges is a Python3 library that is used for advanced and intuitive printing.
Python
4
star
19

EntySec-Docs

EntySec Documentation
HTML
4
star
20

HatSploit-Website

Modular penetration testing platform that enables you to write, test, and execute exploit code.
CSS
4
star
21

Fishnet-Auditor

Fishnet plugin for analysing networks and scanning local hosts for services.
Python
3
star
22

Fishnet-Metasploit

Fishnet Metasploit integration. This one is very useful, cause 99% of hackers use Metasploit (excluding me).
Python
3
star
23

HatSploit-Docs

HatSploit Documentation
Ruby
3
star
24

Fishnet-HatSploit

HatSploit Framework extension for Fishnet that represents a native vulnerability scanner.
Python
2
star
25

Monhorn

Monhorn is an implementation of HatSploit encryptor that firstly establishes a remote connection and then begins crypto operations.
C
2
star
26

eterpay

Crypto payment system that we deserve. Can be used for marketplaces and etc.
Python
2
star
27

EntySec-Website

EntySec is a group of security professionals and software engineers involved in the development of security tools and services.
HTML
1
star
28

.github

EntySec is a group of security professionals and software engineers involved in the development of security tools and services.
1
star