Kage: Graphical user interface for Metasploit Meterpreter

0 37
Installed and configured on the local deviceMetasploit-FrameworkThe following co...

Kage: Graphical user interface for Metasploit Meterpreter

Installed and configured on the local deviceMetasploit-FrameworkThe following components are included in the PATH environment variable:

Msfrpcd

Msfvenom

Msfdb

Tool Installation

Precompiled Installation

The general researchers can directly access the [Releases Page】Download precompiled tool code.

Source Code Acquisition

For developers, it is also possible to directly download the source code of this project and manually build it.

Firstly, use the following command to clone the source code of this project locally:

git clone https://github.com/WayzDev/Kage.git

Next, switch to the project directory and install the necessary dependency components for the tool:

cd Kage

yarn # Or npm install

yarn run dev # Or npm run dev

The following command can be used to build the project code:

yarn run build

Note that if you need to generate APK Payload, please select Raw format from the drop-down menu.

We recommend using electron-vue, as it handles tool dependency components better and reduces the size of the final build code.

Tool Running Screenshots

Tool Dashboard

Tool Control Panel

Server Status

File Management

Session Management

Tool Usage Demonstration

Video Address:【Click to Watch

License Agreement

The development and release of this project followGPL-3.0Open Source License Agreement.

Project Address

Kage:【GitHub Gateway

Reference Materials

https://github.com/AhMyth/AhMyth-Android-RAT

https://github.com/rapid7/metasploit-framework

https://simulatedgreg.gitbooks.io/electron-vue/content/en/getting_started.html

https://yarnpkg.com/en/

http://www.metasploit.com/

https://github.com/tomasgvivo/node-msfrpc

https://github.com/SimulatedGREG/electron-vue

https://github.com/vuejs/vue-cli

https://simulatedgreg.gitbooks.io/electron-vue/content/index.html

你可能想看:

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

graphw00f: A powerful GraphQL server engine fingerprinting tool

Comprehensive Guide to Linux Two-factor Identity Authentication: ssh + console + graphical interface

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

3.6 Should not use OS package manager update instructions such as apt-get update or yum update separately or on a single line in Dockerfile

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

Enterprises have insufficient response capabilities, and the cybersecurity of the manufacturing industry faces severe challenges

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Data Compliance for Enterprises Going Global: The 'Unavoidable' Extraterritorial Jurisdiction of GDPR

最后修改时间:
admin
上一篇 2025年03月30日 16:58
下一篇 2025年03月30日 17:21

评论已关闭