This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
☆752Sep 1, 2022Updated 3 years ago
Alternatives and similar repositories for Vegile
Users that are interested in Vegile are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,337Jan 23, 2018Updated 8 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 6 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,258Mar 9, 2020Updated 6 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,222Mar 17, 2024Updated 2 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Multiplatform payload dropper☆279Aug 17, 2021Updated 4 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Apr 26, 2019Updated 7 years ago
- Chrome Keylogger Extension | Post Exploitation Tool☆445Apr 26, 2022Updated 4 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆38Dec 18, 2016Updated 9 years ago
- venom - C2 shellcode generator/compiler/handler☆1,949Dec 9, 2023Updated 2 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,976Mar 22, 2024Updated 2 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,468May 6, 2024Updated 2 years ago
- fireELF - Fileless Linux Malware Framework☆682Apr 17, 2019Updated 7 years ago
- Cloak can backdoor any python script with some tricks.☆503May 5, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,406Feb 10, 2021Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,467Nov 3, 2018Updated 7 years ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,127Jun 24, 2019Updated 6 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,774Dec 9, 2025Updated 5 months ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,192Oct 20, 2022Updated 3 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆294Feb 28, 2018Updated 8 years ago
- Python antivirus evasion tool☆1,451Oct 21, 2023Updated 2 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆273Jun 5, 2023Updated 2 years ago
- cobaltstrike ms17-010 module and some other☆419Jun 13, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)☆2,325Apr 27, 2026Updated 3 weeks ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,807Oct 26, 2024Updated last year
- Antivirus evasion project☆1,160Jan 19, 2025Updated last year
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,228Oct 1, 2022Updated 3 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,419Jul 20, 2020Updated 5 years ago
- Inject malicious code into *.debs☆286Apr 26, 2022Updated 4 years ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,369Jun 27, 2024Updated last year
- Collection My Wordlist☆122Feb 4, 2017Updated 9 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,531Jun 30, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Pwn nginx - a nginx backdoor provides shell access, socks5 tunneling, http password sniffing.☆229Jun 12, 2019Updated 6 years ago
- Load shellcode into a new process☆764Jun 2, 2021Updated 4 years ago
- Webshell && Backdoor Collection☆2,001Apr 6, 2020Updated 6 years ago
- Bash post exploitation toolkit☆750Apr 1, 2026Updated last month
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy☆146Jan 26, 2017Updated 9 years ago
- NXcrypt - 'python backdoor' framework☆368Jun 26, 2017Updated 8 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆941May 28, 2025Updated 11 months ago