This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
☆23Jan 20, 2018Updated 8 years ago
Alternatives and similar repositories for Vegile
Users that are interested in Vegile are comparing it to the libraries listed below
Sorting:
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆22Sep 7, 2017Updated 8 years ago
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- Telegram notification for metasploit sessions.☆13Nov 22, 2018Updated 7 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Network and web related exploratory playground.☆19Apr 6, 2016Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Apr 5, 2018Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Custom network stack in Go☆28Dec 7, 2016Updated 9 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- ☆22Apr 11, 2017Updated 8 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆750Sep 1, 2022Updated 3 years ago
- Shamir Secret Sharing for Nim☆10May 28, 2021Updated 4 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- ☆17Aug 9, 2016Updated 9 years ago
- p7zip with hfs symlink support☆10Jul 18, 2015Updated 10 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- A Python application to download Google Books and convert them in PDF in a given folder.☆11Oct 21, 2013Updated 12 years ago
- A Linux RAT in C☆33Oct 29, 2018Updated 7 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- Graphical User Interface for remote monitoring and top-level control of UAVs.☆13Jul 31, 2025Updated 7 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Oct 16, 2019Updated 6 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- ☆11Jun 22, 2020Updated 5 years ago