惊雷无声 发表于 2024-6-15 00:42:16

在 VMware 假造机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安


[*]在 VMware 假造机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程

[*]VMware 假造机解锁 macOS 安装选项
[*]使用 macOS iso 系统镜像安装
[*]使用 OpenCore 做引导步伐安装

在 VMware 假造机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程

当涉及在 VMware 假造机上安装黑苹果(Hackintosh)时,有两种重要方法:

[*]使用 macOS iso 镜像安装。
[*]使用 OpenCore 作引导步伐安装。
本文重点介绍使用 macOS ISO 黑苹果镜像的安装方法,并提供免费的 macOS Monterey (12.7) 系统镜像资源下载链接。
从设置 VMware 到安装过程,一步步指导安装黑苹果,让你轻松体验 macOS 假造化环境。
   OpenCore 的使用方式,请参考:https://dortania.github.io/OpenCore-Install-Guide/
解锁工具 csdn:
https://download.csdn.net/download/cheungxiongwei/88639281?spm=1001.2014.3001.5503
VMware 假造机解锁 macOS 安装选项

Monterey (12.7) 镜像资源下载:zip压缩分卷合集,全部下载下来,解压即可。
免费下载,无任何下载积分,全部下载完成后,打开 Monterey.zip 文件即可解压 macOS iso 系统镜像文件。
https://download.csdn.net/download/cheungxiongwei/88639279
https://download.csdn.net/download/cheungxiongwei/88639037?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639076?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639196?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639202?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639210?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639215?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639220?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639227?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639234?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639253?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639260?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639270?spm=1001.2014.3001.5503

   VMware macOS

https://img-blog.csdnimg.cn/direct/723c8e5768c44f179a82f021fcdb0c7c.png#pic_center
为了让 VMware 可以创建 macOS 假造机,需要下载 unlock.exe 工具, 并以管理员权限运行 unlock.exe 工具,给 VMware 打上 macOS 补丁。
下载地点:从 https://github.com/DrDonk/unlocker 下载 unlocker 工具。
https://img-blog.csdnimg.cn/direct/2623eed6f19841c88a59cb93bded5102.png#pic_center
unlock.exe 工具输出内容如下:
Unlocker 4.2.7 for VMware Workstation/Player
============================================

VMware is installed at:C:\Program Files (x86)\VMware\VMware Workstation\
VMware version:20800274

Stopping VMware services and tasks...
Stopping serviceVMUSBArbService
Stopping serviceVMAuthdService
Stopping serviceVmwareAutostartService
Stopping taskvmware-tray.exe

Installing unlock patches
Patching...
Patching C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll
C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmwarebase.dll
Flag patched @ offset: 0x004e85e0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e8620Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e8660Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e86a0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e86e0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e8720Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e8760Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e87a0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e87e0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e8820Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e8860Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e88a0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e88e0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e8920Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e8960Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e89a0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e89e0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x004e8a20Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e1a0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e1e0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e220Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e260Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e2a0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e2e0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e320Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e360Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e3a0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e3e0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e420Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e460Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e4a0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e4e0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e520Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e560Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e5a0Flag: 0x3e -> 0x3f
Flag patched @ offset: 0x0059e5e0Flag: 0x3e -> 0x3f
Patched 36 flags

Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe
C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmware-vmx.exe
appleSMCTableV0 (smc.version = '0')
File Offset: 0x00cd6300
Keys Address : 0x140cd7b20
Public Keys: 0x00f0/0240
Private Keys : 0x00f2/0242

Table Offset : 0x00cd6320
Getting +LKS:
0x00cd6368 +LKS 01flag 0x90 0x1401f8ec0 07
Patching OSK0:
0x00cda6a0 OSK0 32ch8* 0x80 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
0x00cda6a0 OSK0 32ch8* 0x80 0x1401f8ec0 6f757268617264776f726b62797468657365776f72647367756172646564706c
Patching OSK1:
0x00cda6e8 OSK1 32ch8* 0x80 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
0x00cda6e8 OSK1 32ch8* 0x80 0x1401f8ec0 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63

appleSMCTableV1 (smc.version = '1')
File Offset: 0x00cda730
Keys Address : 0x140cdbf50
Public Keys: 0x01b0/0432
Private Keys : 0x01b4/0436

Table Offset : 0x00cda750
Getting +LKS:
0x00cda828 +LKS 01flag 0x90 0x1401f8ec0 01
Patching OSK0:
0x00ce2160 OSK0 32ch8* 0x90 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
0x00ce2160 OSK0 32ch8* 0x90 0x1401f8ec0 6f757268617264776f726b62797468657365776f72647367756172646564706c
Patching OSK1:
0x00ce21a8 OSK1 32ch8* 0x90 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
0x00ce21a8 OSK1 32ch8* 0x90 0x1401f8ec0 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63

Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe
C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmware-vmx-debug.exe
appleSMCTableV0 (smc.version = '0')
File Offset: 0x00f99010
Keys Address : 0x140f9ac30
Public Keys: 0x00f0/0240
Private Keys : 0x00f2/0242

Table Offset : 0x00f99030
Getting +LKS:
0x00f99078 +LKS 01flag 0x90 0x140273520 07
Patching OSK0:
0x00f9d3b0 OSK0 32ch8* 0x80 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
0x00f9d3b0 OSK0 32ch8* 0x80 0x140273520 6f757268617264776f726b62797468657365776f72647367756172646564706c
Patching OSK1:
0x00f9d3f8 OSK1 32ch8* 0x80 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
0x00f9d3f8 OSK1 32ch8* 0x80 0x140273520 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63

appleSMCTableV1 (smc.version = '1')
File Offset: 0x00f9d440
Keys Address : 0x140f9f060
Public Keys: 0x01b0/0432
Private Keys : 0x01b4/0436

Table Offset : 0x00f9d460
Getting +LKS:
0x00f9d538 +LKS 01flag 0x90 0x140273520 01
Patching OSK0:
0x00fa4e70 OSK0 32ch8* 0x90 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
0x00fa4e70 OSK0 32ch8* 0x90 0x140273520 6f757268617264776f726b62797468657365776f72647367756172646564706c
Patching OSK1:
0x00fa4eb8 OSK1 32ch8* 0x90 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
0x00fa4eb8 OSK1 32ch8* 0x90 0x140273520 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63

Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe
C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmware-vmx-stats.exe
appleSMCTableV0 (smc.version = '0')
File Offset: 0x00d32a30
Keys Address : 0x140d34a50
Public Keys: 0x00f0/0240
Private Keys : 0x00f2/0242

Table Offset : 0x00d32a50
Getting +LKS:
0x00d32a98 +LKS 01flag 0x90 0x140208340 07
Patching OSK0:
0x00d36dd0 OSK0 32ch8* 0x80 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
0x00d36dd0 OSK0 32ch8* 0x80 0x140208340 6f757268617264776f726b62797468657365776f72647367756172646564706c
Patching OSK1:
0x00d36e18 OSK1 32ch8* 0x80 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
0x00d36e18 OSK1 32ch8* 0x80 0x140208340 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63

appleSMCTableV1 (smc.version = '1')
File Offset: 0x00d36e60
Keys Address : 0x140d38e80
Public Keys: 0x01b0/0432
Private Keys : 0x01b4/0436

Table Offset : 0x00d36e80
Getting +LKS:
0x00d36f58 +LKS 01flag 0x90 0x140208340 01
Patching OSK0:
0x00d3e890 OSK0 32ch8* 0x90 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
0x00d3e890 OSK0 32ch8* 0x90 0x140208340 6f757268617264776f726b62797468657365776f72647367756172646564706c
Patching OSK1:
0x00d3e8d8 OSK1 32ch8* 0x90 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
0x00d3e8d8 OSK1 32ch8* 0x90 0x140208340 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63

Patching Complete!

Copying VMware Tools...
C:\Users\root\Downloads\unlocker427\iso\darwinPre15.iso -> C:\Program Files (x86)\VMware\VMware Workstation\darwinPre15.iso
C:\Users\root\Downloads\unlocker427\iso\darwin.iso -> C:\Program Files (x86)\VMware\VMware Workstation\darwin.iso

Starting VMware services and tasks...
Starting serviceVMAuthdService
Starting serviceVMUSBArbService
Starting serviceVmwareAutostartService
Starting taskC:\Program Files (x86)\VMware\VMware Workstation\vmware-tray.exe


Press Enter key to continue...
如今可以打开 VMware 假造机软件,就可以创建 macOS 假造机了。
https://img-blog.csdnimg.cn/direct/ee320aa4de584fa1bdb66ad369b16f51.png#pic_center
使用 macOS iso 系统镜像安装

在实行该步骤之前,确保 VMware 已解锁成功。

[*] 下载 macOS 系统镜像
[*] 创建 macOS 假造机
这里选择 macOS 12
https://img-blog.csdnimg.cn/direct/ee320aa4de584fa1bdb66ad369b16f51.png#pic_center
选择 macOS Monterey (12.7) 镜像,提示以下内容:
https://img-blog.csdnimg.cn/direct/18d59da5b1f144e48f94c04b6435ed7f.png#pic_center
这是因为你使用的是 AMD CPU (注:intel CPU 直接安装就行,不用添加下面内容,固然可以也添加产物型号),此时关闭假造机,然后编辑 macOS 12 假造机 macOS 12.vmx 配置文件。
为了在 AMD CPU 上安装该系统,需要在文件末尾添加以下内容:
cpuid.0.eax = "0000:0000:0000:0000:0000:0000:0000:1011"
cpuid.0.ebx = "0111:0101:0110:1110:0110:0101:0100:0111"
cpuid.0.ecx = "0110:1100:0110:0101:0111:0100:0110:1110"
cpuid.0.edx = "0100:1001:0110:0101:0110:1110:0110:1001"
cpuid.1.eax = "0000:0000:0000:0001:0000:0110:0111:0001"
cpuid.1.ebx = "0000:0010:0000:0001:0000:1000:0000:0000"
cpuid.1.ecx = "1000:0010:1001:1000:0010:0010:0000:0011"
cpuid.1.edx = "0000:0111:1000:1011:1111:1011:1111:1111"
vhv.enable = "FALSE"
vpmc.enable = "FALSE"
vvtd.enable = "FALSE"

   Note: 确保 vmx 配置文件中,不存在重复的键
[非必须选项] 固然也可以继承添加以下内容,给系统镜像自界说产物型号,例如 iMac 、MacBookPro 等。
iMac
hw.model = "iMac20,2"
board-id = "Mac-AF89B6D9451A490B"
MacBookPro
hw.model = "MacBookPro16,4"
board-id = "Mac-A61BADE1FDAD7B05"
具体对应关系表格如下:
MacBook Pro
Model IdentifierMachine ModelBoard IDMacBookPro16,4(16-inch, AMD Radeon Pro 5600M)Mac-A61BADE1FDAD7B05MacBookPro16,3(13-inch 2020)Mac-5F9802EFE386AA28MacBookPro16,2(13-inch 2020)Mac-E7203C0F68AA0004 iMac
Model IdentifierMachine ModelBoard IDiMac20,2(Retina 5K, 27-Inch, 2020)Mac-AF89B6D9451A490B https://img-blog.csdnimg.cn/direct/9eb380fecce04bfca9497f9353dc4dea.png#pic_center
https://img-blog.csdnimg.cn/direct/638a31db0abc466b897ba47055a1e720.png#pic_center
https://img-blog.csdnimg.cn/direct/56c96d5402f94993bc0dfbbc10981a84.png#pic_center
使用 OpenCore 做引导步伐安装

https://img-blog.csdnimg.cn/direct/484bafe4dab44ac49451b5155e7b618c.png#pic_center
上图 macOS Sonoma 14.1 是使用 OpenCore 的方式这些安装.
安装时需要留意以下问题:
创建假造机时,选择使用现有假造磁盘,然后选择 OpenCore 焦点引导文件。
https://img-blog.csdnimg.cn/direct/8df2ef881de14a22930bd164eab13efb.png#pic_center
确保 OpenCore 引导步伐文件使用 SATA 0:0 启动。
然后添加第二个硬盘,添加 mac iso 系统镜像,启动假造机安装即可。

免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!更多信息从访问主页:qidao123.com:ToB企服之家,中国第一个企服评测及商务社交产业平台。
页: [1]
查看完整版本: 在 VMware 假造机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安