VENOM 1.0.15 - metasploit Shellcode generator/compiller
Version release : v1.0.15
Author : pedro ubuntu [ r00t-3xp10it ]
Codename: Pandora's box (pithos)
Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS
Suspicious-Shell-Activity (SSA) RedTeam develop @2018
Author : pedro ubuntu [ r00t-3xp10it ]
Codename: Pandora's box (pithos)
Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS
Suspicious-Shell-Activity (SSA) RedTeam develop @2018
LEGAL DISCLAMER
The author does not hold any responsibility for the bad use
of this tool, remember that attacking targets without prior
consent is illegal and punished by law.
FRAMEWORK DESCRIPTION
The script will use msfvenom (metasploit) to generate shellcode
in diferent formats ( c | python | ruby | dll | msi | hta-psh )
injects the shellcode generated into one template (example: python)
"the python funtion will execute the shellcode into ram" and uses
compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller
to build the executable file, also starts a multi-handler to
recive the remote connection (shell or meterpreter session).
'venom generator' tool reproduces some of the technics used
by Veil-Evasion.py, unicorn.py, powersploit.py, etc, etc, etc..
"P.S. some payloads are undetectable by AV soluctions... yes!!!"
One of the reasons for that its the use of a funtion to execute
the 2º stage of shell/meterpreter directly into targets ram
the other reazon its the use of external obfuscator/crypters.
of this tool, remember that attacking targets without prior
consent is illegal and punished by law.
FRAMEWORK DESCRIPTION
The script will use msfvenom (metasploit) to generate shellcode
in diferent formats ( c | python | ruby | dll | msi | hta-psh )
injects the shellcode generated into one template (example: python)
"the python funtion will execute the shellcode into ram" and uses
compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller
to build the executable file, also starts a multi-handler to
recive the remote connection (shell or meterpreter session).
'venom generator' tool reproduces some of the technics used
by Veil-Evasion.py, unicorn.py, powersploit.py, etc, etc, etc..
"P.S. some payloads are undetectable by AV soluctions... yes!!!"
One of the reasons for that its the use of a funtion to execute
the 2º stage of shell/meterpreter directly into targets ram
the other reazon its the use of external obfuscator/crypters.
HOW TO INSTALL VENOM TOOLS IN KALI LINUX
Step 1: open terminal and type
cd Desktopgit clone https://github.com/r00t-3xp10it/venom.git
step 2:
cd venom./venom.sh
Step 3: Press enter to continue
Step 4: choose options whichever you want to do.
For example :- 1 for unix , 2 for window, 4 for Android etc....
Thats it..
Note: this tutorials is for educational purpose only..
In my next tutorials i am gonna show you want to use this tool.
stay tuned to our website.
keep visiting and learn something new..
subscribe also to get update tutorials via email..
No comments:
Post a Comment