The script will use msfvenom (metasploit) to generate shellcode in different formats ( C# | python | ruby | dll | msi | hta-psh | doc | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python function will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a handler to receive the remote connection (shell or meterpreter) venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html to be hable to trigger payload downloads, the user just needs to send the link provided to target host.

Features

  • The script will use msfvenom (metasploit) to generate shellcode
  • 'venom' reproduces some of the technics used by Veil-Evasion.py
  • venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN)
  • Apache2 (malicious url) will copy all files needed to your webroot, and starts apache for you
  • Set execution permissions

Project Samples

Project Activity

See All Activity >

License

MIT License

Follow VENOM C2 shellcode

VENOM C2 shellcode Web Site

Other Useful Business Software
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Try Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of VENOM C2 shellcode!

Additional Project Details

Programming Language

Unix Shell

Related Categories

Unix Shell Post-Exploitation Frameworks

Registered

2023-06-07