# venom **Repository Path**: Cross6/venom ## Basic Information - **Project Name**: venom - **Description**: venom - shellcode generator/compiler/handler (metasploit) - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2019-11-05 - **Last Updated**: 2020-12-20 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README [![Version](https://img.shields.io/badge/VENOM-1.0.15-brightgreen.svg?maxAge=259200)]() [![Stage](https://img.shields.io/badge/Release-Stable-brightgreen.svg)]() [![Build](https://img.shields.io/badge/Supported_OS-Linux-orange.svg)]() [![AUR](https://img.shields.io/aur/license/yaourt.svg)]() ## VENOM 1.0.15 - metasploit Shellcode generator/compiller Version release : v1.0.15 Author : pedro ubuntu [ r00t-3xp10it ] Codename: Pandora's box (pithos) Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS Suspicious-Shell-Activity (SSA) RedTeam develop @2018 ![venom shellcode v1.0.15](http://i.cubeupload.com/bYQJc8.png) ## LEGAL DISCLAMER The author does not hold any responsibility for the bad use of this tool, remember that attacking targets without prior consent is illegal and punished by law. ## FRAMEWORK DESCRIPTION The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ) injects the shellcode generated into one template (example: python) "the python funtion will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file, also starts a multi-handler to recive the remote connection (shell or meterpreter session). 'venom generator' tool reproduces some of the technics used by Veil-Evasion.py, unicorn.py, powersploit.py, etc, etc, etc.. "P.S. some payloads are undetectable by AV soluctions... yes!!!" One of the reasons for that its the use of a funtion to execute the 2º stage of shell/meterpreter directly into targets ram the other reazon its the use of external obfuscator/crypters. ## HOW DO I DELIVER MY PAYLOADS TO TARGET HOST ? venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html that takes advantage of