SkillAgentSearch skills...

Venom

Venom shellcode SSA-RedTeam

Install / Use

/learn @hktalent/Venom
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Twitter: @Hktalent3135773

Tweet Follow on Twitter Github Stars GitHub Followers GitHub forks

GitHub issues GitHub watchers GitHub contributors GitHub code size in bytes GitHub language count GitHub search hit counter GitHub top language os nodejs python license

git clone https://github.com/hktalent/Venom /opt/shell
cd /opt/shell
./venom.sh
         __    _ ______  ____   _  _____  ____    __
         \  \  //|   ___||    \ | |/     \|    \  /  |
          \  \// |   ___||     \| ||     ||     \/   |
           \__/  |______||__/\____|\_____/|__/\__/|__|1.0.12
    +-----------------+-----------+------------+------------------+
    |  OPTIONS BUILD  | TARGET OS |   FORMAT   |      OUTPUT      |
    +-----------------+-----------+------------+------------------+
    |  1 - shellcode     unix         C             C             |
    |  2 - shellcode     windows      C             DLL           |
    |  3 - shellcode     windows      DLL           DLL           |
    |  4 - shellcode     windows      C             PYTHON/EXE    |
    |  5 - shellcode     windows      C             EXE           |
    |  6   shellcode     windows      PSH-CMD       EXE           |
    |  7 - shellcode     windows      C             RUBY          |
    |  8 - shellcode     windows      MSIEXEC       MSI           |
    |  9 - shellcode     windows      POWERSHELL    BAT           |
    | 10 - shellcode     windows      HTA-PSH       HTA           |
    | 11 - shellcode     windows      PSH-CMD       PS1           |
    | 12 - shellcode     windows      PSH-CMD       BAT           |
    | 13 - shellcode     windows      VBS           VBS           |
    | 14 - shellcode     windows      PSH-CMD       VBS           |
    | 15 - shellcode     windows      PSH-CMD/C     PDF           |
    | 16 - shellcode     webserver    PHP           PHP/PHP       |
    | 17 - shellcode     multi OS     PYTHON        PYTHON        |
    | 18 - shellcode     multi OS     JAVA/PSH      JAR(RCE)      |
    | 19 - web_delivery  multi OS     PYTHON/PSH    PYTHON/BAT    |
    | 20 - shellcode     android      DALVIK        APK           |
    |                                                             |
    |  S - system built-in shells                                 |
    |  F - FAQ (frequent ask questions)                           |
    |  E - exit Shellcode Generator                               |
    +-------------------------------------------------------------+
                                                 SSA-RedTeam@2016_|

[☠ ] Shellcode Generator
[➽ ] Chose Your Venom:

VENOM 1.0.12

metasploit Shellcode generator/compiler/listenner
Author: peterubuntu10@sourceforge.net  [ r00t-3xp10it ]
Suspicious-Shell-Activity (SSA) RedTeam develop @2016
HomePage: http://sourceforge.net/u/peterubuntu10/profile/

[ DISCLAMER ]

The author does not hold any responsibility for the bad use
of this tool, remember that attacking targets without prior
consent is illegal and punished by law.

[ DESCRIPTION ]

The script will use msfvenom (metasploit) to generate shellcode
in diferent formats ( c | python | ruby | dll | msi | hta-psh )
injects the shellcode generated into one template (example: python)
"the python funtion will execute the shellcode into ram" and uses
compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller
to build the executable file, also starts a multi-handler to
recive the remote connection (shell or meterpreter session).

'venom generator' tool reproduces some of the technics used
by Veil-Evasion.py, unicorn.py, powersploit.py, etc, etc, etc..
But venom its not a fork of any of this tools because its writen
using Bash contrary to those tools that uses Python, also
remmenber that veil evasion does not build this formats:
[.msi .hta .vbs .ps1 .dll .php .jar .pdf] payload formats...

"P.S. some payloads are undetectable by AV soluctions... yes!!!"
One of the reasons for that its the use of a funtion to execute
the 2º stage of shell/meterpreter directly into targets ram
the other reazon its the use of external obfuscator/crypters.

[ DEPENDENCIES ]

Zenity | Metasploit | GCC (compiler) | Pyinstaller (compiler)
mingw32 (compiler) | pyherion.py (crypter) | wine (emulator)
PEScrambler.exe (PE obfuscator) | apache2 (webserver)| winrar
vbs-obfuscator (crypter) | encrypt_PolarSSL (crypter) and
ettercap MitM+DNS_Spoof (venom domain name attack vector)

"venom.sh will download/install all dependencies as they are needed"
Adicionally as build shell/aux/setup.sh to help you install all venom
framework dependencies (metasploit as to be manually installed). 

Related Skills

View on GitHub
GitHub Stars4
CategoryDevelopment
Updated2y ago
Forks2

Languages

Shell

Security Score

55/100

Audited on May 1, 2023

No findings