venom

venom (metasploit) shellcode generator/compiler/listener

Github星跟蹤圖

Version
Stage
Build
licence

VENOM 1.0.16 - metasploit Shellcode generator/compiller

Version release : v1.0.16
Author : pedro ubuntu  [ r00t-3xp10it ]
Codename: Aconite (Aconitum napellus)
Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS
Suspicious-Shell-Activity (SSA) RedTeam develop @2019

banner

The author does not hold any responsibility for the bad use of this tool, remember that attacking targets
without prior consent is illegal and punished by law. So use this tool responsibly.

FRAMEWORK DESCRIPTION

The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( C#, python, ruby
dll, msi, hta-psh, docm, apk, macho, elf, deb, mp4, etc ) injects the shellcode generated into
one template (example: python) "the python funtion will execute the shellcode into ram" and uses compilers
like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a
multi-handler to recive the remote connection (shell or meterpreter session).

'venom generator' reproduces some of the technics used by Veil-Evasion.py, unicorn.py, powersploit.py, etc..

HOW DO I DELIVER MY PAYLOADS TO TARGET HOST ?

venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN)
using a fake webpage writen in html that takes advantage of <iframe> <meta-http-equiv> or <form> tags to
be hable to trigger payload downloads, the user just needs to send the link provided to target host.

"Apache2 (malicious url) will copy all files needed to your webroot, and starts apache for you."

venom shellcode v1.0.16

DEPENDENCIES

Zenity, Metasploit, GCC (compiler), Pyinstaller (compiler), mingw32 (compiler), pyherion.py (crypter)
wine (emulator), PEScrambler.exe (PE obfuscator), apache2 (webserver), winrar (wine), shellter (KyRecon)
vbs-obfuscator (obfuscator), avet (Daniel Sauder), ettercap (MitM + DNS_Spoofing), icmpsh (ICMP shell)
openssl (build SSL certs), CarbonCopy (sign exe binarys), ResourceHacker (wine), NXcrypt (python crypter)

"venom.sh will download/install all dependencies as they are needed". Adicionally was build the script
venom-main/aux/setup.sh to help you install all framework dependencies fast and easy. we just need to install
first the most importante dependencies before trigger setup.sh = zenity, metasploit, ettercap ..

DOWNLOAD/INSTALL

1º - Download framework from github
git clone https://github.com/r00t-3xp10it/venom.git

2º - Set execution permitions
cd venom-main
sudo find ./ -name "*.sh" -exec chmod +x {} \;
sudo find ./ -name "*.py" -exec chmod +x {} \;

3º - Install all dependencies
cd aux && sudo ./setup.sh

4º - Run main tool
sudo ./venom.sh

Update venom instalation (compare local version againts github oficial version)
sudo ./venom.sh -u

Framework Main Menu

banner
venom shellcode v1.0.16
venom shellcode v1.0.16

Detailed info about release 1.0.16: https://github.com/r00t-3xp10it/venom/releases
Suspicious-Shell-Activity© (SSA) RedTeam develop @2019

_EOF

主要指標

概覽
名稱與所有者r00t-3xp10it/venom
主編程語言Shell
編程語言Ruby (語言數: 10)
平台
許可證
所有者活动
創建於2016-11-16 10:40:04
推送於2023-12-09 00:42:22
最后一次提交2021-09-20 22:39:14
發布數6
最新版本名稱v1.0.17.7 (發布於 )
第一版名稱v1.0.12-beta (發布於 )
用户参与
星數1.9k
關注者數91
派生數601
提交數666
已啟用問題?
問題數94
打開的問題數29
拉請求數2
打開的拉請求數4
關閉的拉請求數15
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?