✨🎉NEW✨VENOM✨Generate Random Persistence Module? [2020]🎉✨
MunYa
#VENOM #Persistence #Module venom - shellcode generator/compiler/handler (metasploit) https://github.com/r00t-3xp10it/venom venom - shellcode generator/compiler/handler (metasploit)
LEGAL DISCLAMER The author does not hold any responsibility for the bad use of this tool, remember that attacking targets without prior consent is illegal and punished by law. So use this tool responsibly.
FRAMEWORK DESCRIPTION The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( C# | python | ruby dll | msi | hta-psh | docm | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python funtion will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a multi-handler to recive the remote connection (shell or meterpreter session).
'venom generator' reproduces some of the technics used by Veil-Evasion.py, unicorn.py, powersploit.py, etc..
DOWNLOAD/INSTALL 1º - Download framework from github git clone https://github.com/r00t-3xp10it/venom.git
2º - Set execution permitions cd venom-main sudo find ./ -name ".sh" -exec chmod +x {} ; sudo find ./ -name ".py" -exec chmod +x {} ;
3º - Install all dependencies cd aux && sudo ./setup.sh
4º - Run main tool sudo ./venom.sh
Update venom instalation (compare local version againts github oficial version) sudo ./venom.sh -u
Detailed info about release 1.0.16: https://github.com/r00t-3xp10it/venom/releases Suspicious-Shell-Activity© (SSA) RedTeam develop @2019
25058979 Bytes