
DarwinOps
Your all-in-one macOS red team toolkit. Recon, initial acces, exploit, persist, all in one place.
A comprehensive macOS RedTeam toolkit supporting 14+ initial access formats (APP, PKG, DMG, MACHO, DYLIB, JXA, VSIX and more) with trojan injection and Gatekeeper bypass. It offers multi-layer evasion against both Apple and EDR solutions through obfuscation, in-memory execution, and binary string replacement. Advanced Dylib persistence, implant hardening, and ready-to-use multi-language pentest templates complete the full attack chain.
What DarwinOps Does
DarwinOps is the macOS-specific tool in the BallisKit suite. It addresses a consistent gap in red team tooling: Windows coverage is deep and mature, macOS coverage is thin or nonexistent.
The problem is real. Enterprise environments are heterogeneous. Financial institutions, technology companies, and professional services firms (all TIBER-EU sectors) run significant macOS deployments, often including senior leadership and finance teams on Apple hardware. Assessments that skip macOS are incomplete by definition.
DarwinOps covers the macOS kill chain from initial access through persistence, with evasion built for the specific EDR products deployed in enterprise Apple environments.
Features Overview
| Category | Features |
|---|---|
| Initial Access | 14+ formats: APP, PKG, DMG, MACHO, DYLIB, JXA, VSIX, NPM, PLIST and more |
| Phishing | DMG phishing profiles with Gatekeeper bypass |
| Evasion | XOR obfuscation, variable renaming, in-memory execution, binary string replacement, auto-bypass mode |
| Persistence | Dylib scanning & hijacking, proxying, LaunchAgent, multiple built-in persistence methods |
| C2 Frameworks | Apfell/Mythic JXA hardening, EDR static analysis bypass, bundle ID spoofing, dock concealment |
| Architecture | arm64, x86_64, x86_64h — native Apple Silicon and Intel support |
Key Capabilities
Initial Access
Evasion
Templates & Scenarios
EDR Bypass Profiles
Pre-built, production-tested profiles for major EDRs and Antivirus. Select a profile for your target environment and DarwinOps applies the appropriate bypass chain automatically.
Each profile is tuned to the specific detection logic of the target EDR, not a generic bypass.
Profiles combines format, execution method, and evasion technique for common engagement scenarios.
Profiles are updated as EDR vendors release new detection improvements. Licenses include regular profile updates.
Understanding the macOS Security Architecture
Endpoint Security Framework (ESF)
Apple's official mechanism for security product visibility. EDRs subscribe to ESF events (process execution, file creation, network connections) to monitor endpoint behavior. DarwinOps includes techniques for reducing ESF visibility - suppressing event generation or operating below ESF detection thresholds.
Transparency Consent Control (TCC)
TCC governs access to sensitive macOS resources (camera, microphone, contacts, full disk access). Enterprise deployments often grant MDM-managed TCC permissions that can be abused. DarwinOps includes TCC bypass techniques targeting both user-context TCC and MDM-provisioned TCC grants.
Gatekeeper and Notarization
macOS Gatekeeper enforces code signing and notarization requirements. DarwinOps payload generation handles signing-compatible output and includes techniques for operating in environments with strict Gatekeeper enforcement.
MITRE ATT&CK Technique Coverage
DarwinOps reproduces documented macOS threat actor TTPs with precision. Each delivery format and post-exploitation technique maps to specific ATT&CK IDs - enabling scenario accuracy verification against Threat Intelligence Reports in TIBER-EU and equivalent intelligence-led engagements.
Technique coverage is used by red teams to verify scenario accuracy against Threat Intelligence Reports in TIBER-EU and intelligence-led red team programs globally.
DarwinOps for TIBER-EU macOS Coverage
TIBER-EU engagements at European financial institutions increasingly require macOS coverage. Modern threat actors targeting the financial sector specifically target macOS devices used by senior staff, treasury, and executive leadership. An engagement that does not include macOS in scope is not fully representative of the threat. DarwinOps provides the macOS offensive capability that makes complete TIBER-EU scope coverage executable.
Learn how BallisKit supports TIBER-EUPricing
- All initial access formats and techniques
- All evasion mechanisms and bypass profiles
- All persistence mechanisms
- Implant Hardening
- Regular updates (macOS version compatibility maintained)
- Email support
- Bypass profile update notifications
Bundle pricing available with MacroPack Pro and ShellcodePack.
Volume licensing for 3+ users. Contact contact@balliskit.com.
Professional email required. Anonymized or consumer domains not accepted.
Tutorials and Resources

Initial Access with AppleScript
MacOS is often considered well protected, largely due to Gatekeeper. However, some execution vectors still operate under a different trust…

Initial Access with DarwinOps PKG

Bypass Gatekeeper with DarwinOps DMG templates
So, you’ve just successfully set up Mythic and deployed your first Apfell implant, and you made some basic scenarios. If not, I invite you…
See It in Action
More DarwinOps demos available on the BallisKit Vimeo channel.
Watch on Vimeo →