• Warning! Malware detected. Download at your own risk.
Download Latest Version shell.tar.gz (57.1 MB)
Email in envelope

Get an email when there's a new version of venom - shellcode generator

Home
Name Modified Size InfoDownloads / Week
readme 2016-08-27 2.2 kB
shell.tar.gz 2016-08-27 57.1 MB
Totals: 2 Items   57.1 MB 2
---
-- VENOM 1.0.12 - metasploit Shellcode generator/compiler/listenner
-- Author: peterubuntu10@sourceforge.net  [ r00t-3xp10it ]
-- Suspicious-Shell-Activity (SSA) RedTeam develop @2016
-- HomePage: http://sourceforge.net/u/peterubuntu10/profile/
--
--
-- [ DISCLAMER ]
-- The author does not hold any responsibility for the bad use
-- of this tool, remember that attacking targets without prior
-- consent is illegal and punished by law.
--
--
-- [ DESCRIPTION ]
-- The script will use msfvenom (metasploit) to generate shellcode
-- in diferent formats ( c | python | ruby | dll | msi | hta-psh )
-- injects the shellcode generated into one template (example: python)
-- "the python funtion will execute the shellcode into ram" and uses
-- compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller
-- to build the executable file, also starts a multi-handler to
-- recive the remote connection (shell or meterpreter session).
--
-- 'venom generator' tool reproduces some of the technics used
-- by Veil-Evasion.py, unicorn.py, powersploit.py, etc, etc, etc..
-- But venom its not a fork of any of this tools because its writen
-- using Bash contrary to those tools that uses Python, so i can not
-- copy any funtion writen from any of this tools and past it on my
-- bash script (obvious), also remmenbering that veil evasion does
-- not build: [.msi .hta .vbs .ps1 .dll .php .jar] payload formats...
--
-- "P.S. some payloads are undetectable by AV soluctions... yes!!!"
-- One of the reasons for that its the use of a funtion to execute
-- the 2º stage of shell/meterpreter directly into targets ram
-- the other reazon its the use of external obfuscator/crypters.
--
--
-- [ DEPENDENCIES ]
-- Zenity | Metasploit | GCC (compiler) | Pyinstaller (compiler)
-- mingw32 (compiler) | pyherion.py (crypter) | wine (emulator)
-- PEScrambler.exe (PE obfuscator) | apache2 (webserver)| winrar
-- vbs-obfuscator (crypter) | encrypt_PolarSSL (crypter) and
-- ettercap MitM+DNS_Spoof (venom domain name attack vector)
--
-- "venom.sh will download/install all dependencies as they are needed"
-- Adicionally as build shell/aux/setup.sh to help you install all venom
-- framework dependencies (metasploit as to be manually installed). 
---

Source: readme, updated 2016-08-27