Exegol is a fully configured kali light base with a few useful additional tools (~50), a few useful resources (scripts and binaries for privesc, credential theft etc.) and some configuration (oh-my-zsh, history, aliases, colourized output for some tools).
It can be used in pentest engagements and BugBounty. Exegol’s original fate was to be a ready-to-hack docker in case of emergencies during engagements. It is now an environment my team and I use in day to day engagements.
Quick Start
The project is on Docker Hub, you don’t need to clone this git.
alias exegol-update=’docker pull nwodtuhs/exegol’
alias exegol-build=’docker build –tag nwodtuhs/exegol /PATH/TO/Exegol/’
alias exegol-run=’docker run –interactive –tty –detach –network host –volume /PATH/TO/Exegol/shared-volume:/share –name exegol nwodtuhs/exegol’
alias exegol-shell=’docker exec -it exegol zsh’
alias exegol-stop=’docker stop exegol && docker rm exegol’
Also Read – Invoker : Penetration Testing Utility
Pre-requisites
Docker is needed here if you want to run Exegol in a docker (intended). You can also use the install.sh in order to deploy Exegol elsewhere but I don’t guarantee it’ll work. (That being said I don’t guarantee anything bro)
Need a quick install of docker & docker-compose? Check this out (intended for kali users but I guess it could work on any other Debian based system)
sudo apt-get install apt-transport-https ca-certificates curl gnupg-agent software-properties-common
curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add –
echo ‘deb [arch=amd64] https://download.docker.com/linux/debian buster stable’ | sudo tee /etc/apt/sources.list.d/docker.list
sudo apt-get update
sudo apt-get install -y docker-ce docker-ce-cli containerd.io
sudo curl -L “https://github.com/docker/compose/releases/download/1.25.3/docker-compose-$(uname -s)-$(uname -m)” -o /usr/local/bin/docker-compose
sudo chmod +x /usr/local/bin/docker-compose
sudo ln -s /usr/local/bin/docker-compose /usr/bin/docker-compose
sudo curl -L https://raw.githubusercontent.com/docker/compose/1.25.3/contrib/completion/bash/docker-compose -o /etc/bash_completion.d/docker-compose
sudo groupadd docker
sudo usermod -aG docker $USER
Install (from Docker Hub)
It can be long, pull exegol before needing it.
docker pull nwodtuhs/exegol
Install (from GitHub)
The build can be long, build exegol before needing it.
git clone https://github.com/ShutdownRepo/Exegol
cd Exegol
docker build –tag exegol
Usage
I personnaly use these aliases to go fast (very fast)
alias exegol-update=’docker pull nwodtuhs/exegol’
alias exegol-build=’docker build –tag nwodtuhs/exegol /PATH/TO/Exegol/’
alias exegol-run=’docker run –interactive –tty –detach –network host –volume /PATH/TO/Exegol/shared-volume:/share –name exegol nwodtuhs/exegol’
alias exegol-shell=’docker exec -it exegol zsh’
alias exegol-stop=’docker stop exegol && docker rm exegol’
exegol-update
exegol-run
exegol-shell
exegol-stop
Tools
The tools installed in Exegol are mostly installed from sources in order to have the latest version when deploying Exegol. Some of the tools can be found in a complete kali install though. Some installs are made with go, pip, apt, gem etc. The installs are not perfect but hey, it works! You will find most of the tools in /opt/tools
. Some of the tools:
Useful Resources
In addition to the many tools pre-installed and configured for some, you will find many useful pre-fetched resources like scripts and binaries in /opt/resources
. There some pre-EoP enumeration scripts (EoP: Escalation of Privileges) and other useful binaries like Rubeus or mimikatz.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…