在 VMware 假造机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安 ...

打印 上一主题 下一主题

主题 552|帖子 552|积分 1656


  • 在 VMware 假造机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程

    • VMware 假造机解锁 macOS 安装选项
    • 使用 macOS iso 系统镜像安装
    • 使用 OpenCore 做引导步伐安装

在 VMware 假造机上安装黑苹果(Hackintosh):免费 macOS ISO 镜像下载及安装教程

当涉及在 VMware 假造机上安装黑苹果(Hackintosh)时,有两种重要方法:

  • 使用 macOS iso 镜像安装。
  • 使用 OpenCore 作引导步伐安装。
本文重点介绍使用 macOS ISO 黑苹果镜像的安装方法,并提供免费的 macOS Monterey (12.7) 系统镜像资源下载链接。
从设置 VMware 到安装过程,一步步指导安装黑苹果,让你轻松体验 macOS 假造化环境。
   OpenCore 的使用方式,请参考:https://dortania.github.io/OpenCore-Install-Guide/
  解锁工具 csdn:
https://download.csdn.net/download/cheungxiongwei/88639281?spm=1001.2014.3001.5503
VMware 假造机解锁 macOS 安装选项

Monterey (12.7) 镜像资源下载:zip压缩分卷合集,全部下载下来,解压即可。
免费下载,无任何下载积分,全部下载完成后,打开 Monterey.zip 文件即可解压 macOS iso 系统镜像文件。
https://download.csdn.net/download/cheungxiongwei/88639279
https://download.csdn.net/download/cheungxiongwei/88639037?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639076?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639196?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639202?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639210?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639215?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639220?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639227?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639234?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639253?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639260?spm=1001.2014.3001.5503
https://download.csdn.net/download/cheungxiongwei/88639270?spm=1001.2014.3001.5503

     VMware macOS
  

为了让 VMware 可以创建 macOS 假造机,需要下载 unlock.exe 工具, 并以管理员权限运行 unlock.exe 工具,给 VMware 打上 macOS 补丁。
下载地点:从 https://github.com/DrDonk/unlocker 下载 unlocker 工具。

unlock.exe 工具输出内容如下:
  1. Unlocker 4.2.7 for VMware Workstation/Player
  2. ============================================
  3. VMware is installed at:  C:\Program Files (x86)\VMware\VMware Workstation\
  4. VMware version:  20800274
  5. Stopping VMware services and tasks...
  6. Stopping service  VMUSBArbService
  7. Stopping service  VMAuthdService
  8. Stopping service  VmwareAutostartService
  9. Stopping task  vmware-tray.exe
  10. Installing unlock patches
  11. Patching...
  12. Patching C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll
  13. C:\Program Files (x86)\VMware\VMware Workstation\vmwarebase.dll -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmwarebase.dll
  14. Flag patched @ offset: 0x004e85e0  Flag: 0x3e -> 0x3f
  15. Flag patched @ offset: 0x004e8620  Flag: 0x3e -> 0x3f
  16. Flag patched @ offset: 0x004e8660  Flag: 0x3e -> 0x3f
  17. Flag patched @ offset: 0x004e86a0  Flag: 0x3e -> 0x3f
  18. Flag patched @ offset: 0x004e86e0  Flag: 0x3e -> 0x3f
  19. Flag patched @ offset: 0x004e8720  Flag: 0x3e -> 0x3f
  20. Flag patched @ offset: 0x004e8760  Flag: 0x3e -> 0x3f
  21. Flag patched @ offset: 0x004e87a0  Flag: 0x3e -> 0x3f
  22. Flag patched @ offset: 0x004e87e0  Flag: 0x3e -> 0x3f
  23. Flag patched @ offset: 0x004e8820  Flag: 0x3e -> 0x3f
  24. Flag patched @ offset: 0x004e8860  Flag: 0x3e -> 0x3f
  25. Flag patched @ offset: 0x004e88a0  Flag: 0x3e -> 0x3f
  26. Flag patched @ offset: 0x004e88e0  Flag: 0x3e -> 0x3f
  27. Flag patched @ offset: 0x004e8920  Flag: 0x3e -> 0x3f
  28. Flag patched @ offset: 0x004e8960  Flag: 0x3e -> 0x3f
  29. Flag patched @ offset: 0x004e89a0  Flag: 0x3e -> 0x3f
  30. Flag patched @ offset: 0x004e89e0  Flag: 0x3e -> 0x3f
  31. Flag patched @ offset: 0x004e8a20  Flag: 0x3e -> 0x3f
  32. Flag patched @ offset: 0x0059e1a0  Flag: 0x3e -> 0x3f
  33. Flag patched @ offset: 0x0059e1e0  Flag: 0x3e -> 0x3f
  34. Flag patched @ offset: 0x0059e220  Flag: 0x3e -> 0x3f
  35. Flag patched @ offset: 0x0059e260  Flag: 0x3e -> 0x3f
  36. Flag patched @ offset: 0x0059e2a0  Flag: 0x3e -> 0x3f
  37. Flag patched @ offset: 0x0059e2e0  Flag: 0x3e -> 0x3f
  38. Flag patched @ offset: 0x0059e320  Flag: 0x3e -> 0x3f
  39. Flag patched @ offset: 0x0059e360  Flag: 0x3e -> 0x3f
  40. Flag patched @ offset: 0x0059e3a0  Flag: 0x3e -> 0x3f
  41. Flag patched @ offset: 0x0059e3e0  Flag: 0x3e -> 0x3f
  42. Flag patched @ offset: 0x0059e420  Flag: 0x3e -> 0x3f
  43. Flag patched @ offset: 0x0059e460  Flag: 0x3e -> 0x3f
  44. Flag patched @ offset: 0x0059e4a0  Flag: 0x3e -> 0x3f
  45. Flag patched @ offset: 0x0059e4e0  Flag: 0x3e -> 0x3f
  46. Flag patched @ offset: 0x0059e520  Flag: 0x3e -> 0x3f
  47. Flag patched @ offset: 0x0059e560  Flag: 0x3e -> 0x3f
  48. Flag patched @ offset: 0x0059e5a0  Flag: 0x3e -> 0x3f
  49. Flag patched @ offset: 0x0059e5e0  Flag: 0x3e -> 0x3f
  50. Patched 36 flags
  51. Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe
  52. C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx.exe -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmware-vmx.exe
  53. appleSMCTableV0 (smc.version = '0')
  54. File Offset  : 0x00cd6300
  55. Keys Address : 0x140cd7b20
  56. Public Keys  : 0x00f0/0240
  57. Private Keys : 0x00f2/0242
  58. Table Offset : 0x00cd6320
  59. Getting +LKS:
  60. 0x00cd6368 +LKS 01  flag 0x90 0x1401f8ec0 07
  61. Patching OSK0:
  62. 0x00cda6a0 OSK0 32  ch8* 0x80 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
  63. 0x00cda6a0 OSK0 32  ch8* 0x80 0x1401f8ec0 6f757268617264776f726b62797468657365776f72647367756172646564706c
  64. Patching OSK1:
  65. 0x00cda6e8 OSK1 32  ch8* 0x80 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
  66. 0x00cda6e8 OSK1 32  ch8* 0x80 0x1401f8ec0 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
  67. appleSMCTableV1 (smc.version = '1')
  68. File Offset  : 0x00cda730
  69. Keys Address : 0x140cdbf50
  70. Public Keys  : 0x01b0/0432
  71. Private Keys : 0x01b4/0436
  72. Table Offset : 0x00cda750
  73. Getting +LKS:
  74. 0x00cda828 +LKS 01  flag 0x90 0x1401f8ec0 01
  75. Patching OSK0:
  76. 0x00ce2160 OSK0 32  ch8* 0x90 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
  77. 0x00ce2160 OSK0 32  ch8* 0x90 0x1401f8ec0 6f757268617264776f726b62797468657365776f72647367756172646564706c
  78. Patching OSK1:
  79. 0x00ce21a8 OSK1 32  ch8* 0x90 0x1401f8f40 0000000000000000000000000000000000000000000000000000000000000000
  80. 0x00ce21a8 OSK1 32  ch8* 0x90 0x1401f8ec0 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
  81. Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe
  82. C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-debug.exe -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmware-vmx-debug.exe
  83. appleSMCTableV0 (smc.version = '0')
  84. File Offset  : 0x00f99010
  85. Keys Address : 0x140f9ac30
  86. Public Keys  : 0x00f0/0240
  87. Private Keys : 0x00f2/0242
  88. Table Offset : 0x00f99030
  89. Getting +LKS:
  90. 0x00f99078 +LKS 01  flag 0x90 0x140273520 07
  91. Patching OSK0:
  92. 0x00f9d3b0 OSK0 32  ch8* 0x80 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
  93. 0x00f9d3b0 OSK0 32  ch8* 0x80 0x140273520 6f757268617264776f726b62797468657365776f72647367756172646564706c
  94. Patching OSK1:
  95. 0x00f9d3f8 OSK1 32  ch8* 0x80 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
  96. 0x00f9d3f8 OSK1 32  ch8* 0x80 0x140273520 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
  97. appleSMCTableV1 (smc.version = '1')
  98. File Offset  : 0x00f9d440
  99. Keys Address : 0x140f9f060
  100. Public Keys  : 0x01b0/0432
  101. Private Keys : 0x01b4/0436
  102. Table Offset : 0x00f9d460
  103. Getting +LKS:
  104. 0x00f9d538 +LKS 01  flag 0x90 0x140273520 01
  105. Patching OSK0:
  106. 0x00fa4e70 OSK0 32  ch8* 0x90 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
  107. 0x00fa4e70 OSK0 32  ch8* 0x90 0x140273520 6f757268617264776f726b62797468657365776f72647367756172646564706c
  108. Patching OSK1:
  109. 0x00fa4eb8 OSK1 32  ch8* 0x90 0x1402736f0 0000000000000000000000000000000000000000000000000000000000000000
  110. 0x00fa4eb8 OSK1 32  ch8* 0x90 0x140273520 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
  111. Patching C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe
  112. C:\Program Files (x86)\VMware\VMware Workstation\x64\vmware-vmx-stats.exe -> C:\Users\root\Downloads\unlocker427\backup\17.0.0.20800274\vmware-vmx-stats.exe
  113. appleSMCTableV0 (smc.version = '0')
  114. File Offset  : 0x00d32a30
  115. Keys Address : 0x140d34a50
  116. Public Keys  : 0x00f0/0240
  117. Private Keys : 0x00f2/0242
  118. Table Offset : 0x00d32a50
  119. Getting +LKS:
  120. 0x00d32a98 +LKS 01  flag 0x90 0x140208340 07
  121. Patching OSK0:
  122. 0x00d36dd0 OSK0 32  ch8* 0x80 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
  123. 0x00d36dd0 OSK0 32  ch8* 0x80 0x140208340 6f757268617264776f726b62797468657365776f72647367756172646564706c
  124. Patching OSK1:
  125. 0x00d36e18 OSK1 32  ch8* 0x80 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
  126. 0x00d36e18 OSK1 32  ch8* 0x80 0x140208340 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
  127. appleSMCTableV1 (smc.version = '1')
  128. File Offset  : 0x00d36e60
  129. Keys Address : 0x140d38e80
  130. Public Keys  : 0x01b0/0432
  131. Private Keys : 0x01b4/0436
  132. Table Offset : 0x00d36e80
  133. Getting +LKS:
  134. 0x00d36f58 +LKS 01  flag 0x90 0x140208340 01
  135. Patching OSK0:
  136. 0x00d3e890 OSK0 32  ch8* 0x90 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
  137. 0x00d3e890 OSK0 32  ch8* 0x90 0x140208340 6f757268617264776f726b62797468657365776f72647367756172646564706c
  138. Patching OSK1:
  139. 0x00d3e8d8 OSK1 32  ch8* 0x90 0x1402083c0 0000000000000000000000000000000000000000000000000000000000000000
  140. 0x00d3e8d8 OSK1 32  ch8* 0x90 0x140208340 65617365646f6e74737465616c2863294170706c65436f6d7075746572496e63
  141. Patching Complete!
  142. Copying VMware Tools...
  143. C:\Users\root\Downloads\unlocker427\iso\darwinPre15.iso -> C:\Program Files (x86)\VMware\VMware Workstation\darwinPre15.iso
  144. C:\Users\root\Downloads\unlocker427\iso\darwin.iso -> C:\Program Files (x86)\VMware\VMware Workstation\darwin.iso
  145. Starting VMware services and tasks...
  146. Starting service  VMAuthdService
  147. Starting service  VMUSBArbService
  148. Starting service  VmwareAutostartService
  149. Starting task  C:\Program Files (x86)\VMware\VMware Workstation\vmware-tray.exe
  150. Press Enter key to continue...
复制代码
如今可以打开 VMware 假造机软件,就可以创建 macOS 假造机了。

使用 macOS iso 系统镜像安装

在实行该步骤之前,确保 VMware 已解锁成功。

  • 下载 macOS 系统镜像
  • 创建 macOS 假造机
这里选择 macOS 12

选择 macOS Monterey (12.7) 镜像,提示以下内容:

这是因为你使用的是 AMD CPU (注:intel CPU 直接安装就行,不用添加下面内容,固然可以也添加产物型号),此时关闭假造机,然后编辑 macOS 12 假造机 macOS 12.vmx 配置文件。
为了在 AMD CPU 上安装该系统,需要在文件末尾添加以下内容:
  1. cpuid.0.eax = "0000:0000:0000:0000:0000:0000:0000:1011"
  2. cpuid.0.ebx = "0111:0101:0110:1110:0110:0101:0100:0111"
  3. cpuid.0.ecx = "0110:1100:0110:0101:0111:0100:0110:1110"
  4. cpuid.0.edx = "0100:1001:0110:0101:0110:1110:0110:1001"
  5. cpuid.1.eax = "0000:0000:0000:0001:0000:0110:0111:0001"
  6. cpuid.1.ebx = "0000:0010:0000:0001:0000:1000:0000:0000"
  7. cpuid.1.ecx = "1000:0010:1001:1000:0010:0010:0000:0011"
  8. cpuid.1.edx = "0000:0111:1000:1011:1111:1011:1111:1111"
  9. vhv.enable = "FALSE"
  10. vpmc.enable = "FALSE"
  11. vvtd.enable = "FALSE"
复制代码
  Note: 确保 vmx 配置文件中,不存在重复的键
  [非必须选项] 固然也可以继承添加以下内容,给系统镜像自界说产物型号,例如 iMac 、MacBookPro 等。
iMac
  1. hw.model = "iMac20,2"
  2. board-id = "Mac-AF89B6D9451A490B"
复制代码
MacBookPro
  1. hw.model = "MacBookPro16,4"
  2. board-id = "Mac-A61BADE1FDAD7B05"
复制代码
具体对应关系表格如下:
MacBook Pro
Model IdentifierMachine ModelBoard IDMacBookPro16,4(16-inch, AMD Radeon Pro 5600M)Mac-A61BADE1FDAD7B05MacBookPro16,3(13-inch 2020)Mac-5F9802EFE386AA28MacBookPro16,2(13-inch 2020)Mac-E7203C0F68AA0004 iMac
Model IdentifierMachine ModelBoard IDiMac20,2(Retina 5K, 27-Inch, 2020)Mac-AF89B6D9451A490B



使用 OpenCore 做引导步伐安装


上图 macOS Sonoma 14.1 是使用 OpenCore 的方式这些安装.
安装时需要留意以下问题:
创建假造机时,选择使用现有假造磁盘,然后选择 OpenCore 焦点引导文件。

确保 OpenCore 引导步伐文件使用 SATA 0:0 启动。
然后添加第二个硬盘,添加 mac iso 系统镜像,启动假造机安装即可。

免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!更多信息从访问主页:qidao123.com:ToB企服之家,中国第一个企服评测及商务社交产业平台。

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

x
回复

使用道具 举报

0 个回复

倒序浏览

快速回复

您需要登录后才可以回帖 登录 or 立即注册

本版积分规则

惊雷无声

金牌会员
这个人很懒什么都没写!

标签云

快速回复 返回顶部 返回列表