Kage: Graphical User Interface for Metasploit Meterpreter and Session Handler

When we all talk about the best Hacking tool The Metasploit console comes in the first position. But the problem is Metasploit is works on Command Line Interface. For beginners, it is difficult to work with Metasploit. So here is a new tool that can be used to work with Metasploit in Graphically. I not here talking about Armitage.

Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with Meterpreter sessions and generate payloads.

For now, it only supports windows/meterpreter & android/meterpreter.


Getting Started

Please follow these instructions to get a copy of Kage running on your local machine without any problems.




Steps to Install Kage

1. Download the AppImage file from GitHub.

2. Install Kage using the below command and run kage:

┌──(mrdev㉿kali)-[~/Downloads]
└─$ ls
Kage.0.1.1-beta_linux_AppImage
┌──(mrdev㉿kali)-[~/Downloads]
└─$ chmod +x Kage.0.1.1-beta_linux_AppImage  #Set Executable permission
┌──(mrdev㉿kali)-[~/Downloads]
└─$ sudo ./Kage.0.1.1-beta_linux_AppImage    #Now run kage

3. Click on the Start server (power button). It will automatically generate a username and password.


4. Now close the session and click on connect. It will appear new window.

You can create malicious code to hack the system. So watch my video to learn how to do it.





Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

#buttons=(Ok, Go it!) #days=(20)

Our website uses cookies to enhance your experience. Learn More
Ok, Go it!