Name | Modified | Size | Downloads / Week |
---|---|---|---|
readme | 2016-08-27 | 2.2 kB | |
shell.tar.gz | 2016-08-27 | 57.1 MB | |
Totals: 2 Items | 57.1 MB | 2 |
--- -- VENOM 1.0.12 - metasploit Shellcode generator/compiler/listenner -- Author: peterubuntu10@sourceforge.net [ r00t-3xp10it ] -- Suspicious-Shell-Activity (SSA) RedTeam develop @2016 -- HomePage: http://sourceforge.net/u/peterubuntu10/profile/ -- -- -- [ DISCLAMER ] -- The author does not hold any responsibility for the bad use -- of this tool, remember that attacking targets without prior -- consent is illegal and punished by law. -- -- -- [ DESCRIPTION ] -- The script will use msfvenom (metasploit) to generate shellcode -- in diferent formats ( c | python | ruby | dll | msi | hta-psh ) -- injects the shellcode generated into one template (example: python) -- "the python funtion will execute the shellcode into ram" and uses -- compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller -- to build the executable file, also starts a multi-handler to -- recive the remote connection (shell or meterpreter session). -- -- 'venom generator' tool reproduces some of the technics used -- by Veil-Evasion.py, unicorn.py, powersploit.py, etc, etc, etc.. -- But venom its not a fork of any of this tools because its writen -- using Bash contrary to those tools that uses Python, so i can not -- copy any funtion writen from any of this tools and past it on my -- bash script (obvious), also remmenbering that veil evasion does -- not build: [.msi .hta .vbs .ps1 .dll .php .jar] payload formats... -- -- "P.S. some payloads are undetectable by AV soluctions... yes!!!" -- One of the reasons for that its the use of a funtion to execute -- the 2º stage of shell/meterpreter directly into targets ram -- the other reazon its the use of external obfuscator/crypters. -- -- -- [ DEPENDENCIES ] -- Zenity | Metasploit | GCC (compiler) | Pyinstaller (compiler) -- mingw32 (compiler) | pyherion.py (crypter) | wine (emulator) -- PEScrambler.exe (PE obfuscator) | apache2 (webserver)| winrar -- vbs-obfuscator (crypter) | encrypt_PolarSSL (crypter) and -- ettercap MitM+DNS_Spoof (venom domain name attack vector) -- -- "venom.sh will download/install all dependencies as they are needed" -- Adicionally as build shell/aux/setup.sh to help you install all venom -- framework dependencies (metasploit as to be manually installed). ---