Exploit-install / Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
☆21Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Vegile
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 9 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- Gmail Knocker☆21Updated 7 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- ☆15Updated last year
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Updated 7 years ago
- PHP Phishing Framework☆28Updated 10 years ago
- Software exploitation training material☆15Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆22Updated 5 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆53Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago