Advertisement
TVT618

venom - Metasploit shellcode Generator/Compiler/Listener

Aug 14th, 2018
112
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.99 KB | None | 0 0
  1. venom 1.0.15 - Metasploit shellcode Generator/Compiler/Listener
  2. Version release : v1.0.15
  3. Author : pedro ubuntu [ r00t-3xp10it ]
  4. Codename: Pandora's box (pithos)
  5. Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS
  6. Suspicious-Shell-Activity (SSA) RedTeam develop @2018
  7.  
  8. LEGAL DISCLAMER
  9. The author does not hold any responsibility for the bad use of this tool, remember that attacking targets without prior consent is illegal and punished by law.
  10.  
  11. Install and Run:
  12. sudo su
  13. apt update && apt install metasploit-framework
  14. git clone https://github.com/r00t-3xp10it/venom
  15. bash ./aux/setup.sh
  16. bash venom.sh
  17.  
  18. FRAMEWORK DESCRIPTION
  19. The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ) injects the shellcode generated into one template (example: python) "the python funtion will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file, also starts a multi-handler to recive the remote connection (shell or meterpreter session).
  20. 'venom generator' tool reproduces some of the technics used by Veil-Evasion.py, unicorn.py, powersploit.py, etc, etc, etc..
  21.  
  22. "P.S. some payloads are undetectable by AV soluctions... yes!!!"
  23. One of the reasons for that its the use of a funtion to execute the 2º stage of shell/meterpreter directly into targets ram the other reazon its the use of external obfuscator/crypters.
  24.  
  25. HOW DO I DELIVER MY PAYLOADS TO TARGET HOST ?
  26. venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html that takes advantage of <iframe> <meta-http-equiv> or "<form>" tags to be hable to trigger payload downloads, the user just needs to send the link provided to target host.
  27.  
  28. "Apache2 (malicious url) will copy all files needed to your webroot"
  29.  
  30. Screenshots:
  31.  
  32. Download venom: https://github.com/r00t-3xp10it/venom
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement