Skip to content

byt3n33dl3/iCloudCracker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

 _ _____ _           _ _____             _           
|_|     | |___ _ _ _| |     |___ ___ ___| |_ ___ ___ 
| |   --| | . | | | . |   --|  _| .'|  _| '_| -_|  _|
|_|_____|_|___|___|___|_____|_| |__,|___|_,_|___|_|  

Apple ID and Credentials Attack

Disclaimer: Do whatever you want with this code as long as you give me credit (@Pr0x13) & (@pxcs)

Check and make sure its legal in your country to use this tool before doing so.
I'm not responsible for any damage done whatsoever to anyones iCloud account or iDevice.
I Didn't exploit any accounts while writing this, as well i didn't even test it out (Hope it works lol).
I merely observed and reported.


Install: 
Put in HtDocs Folder in your Xampp installation.
Install curl for your OS
Navigate to https://github.com/pxcs/iCloudCracker in your web browser (preferably Firefox, Chrome, or Safari).
Wordlist.txt is from iBrute and it satisfies iCloud password Requirements
It's been reported if icloud server responds with an error restart xampp or your computer

-=Reports coming in that Server is now Patched with Rate Limiter=-
-=Server Fully Patched, Discontinue use if you don't want to lock your account!!=-


U S A G E

usage: [-h] [-c] [--mojave] [-b folder]

a script to crack the restriction passcode of an iDevice

optional arguments:
-h, --help            show this help message and exit
-c, --cli             prompts user for input
-m, --mojave              helps user run script on macOS mojave
-b folder, --backup folder
                    where backups are located

What is this?
A 100% Working iCloud Apple ID Dictionary attack that bypasses 
Account Lockout restrictions and Secondary Authentication on any account.
                                                                

What this isn't:
A bypass or fully automated removal


Why? 
This bug is painfully obvious and was only a matter of time before it was 
privately used for malicious or nefarious activities, I publicly disclosed it so apple will patch it.


@Pr0x13
@pxcs

Note: 
Educational Pusposes Only!