What is🤐VENOM?🛸UNIX💻Linux 2019.1💯🤙🏻✔️
MunYa
What is🤐#VENOM?🛸#UNIX💻#Linux 2019.1💯🤙🏻✔️ #VENOM#UNIX#Linux 2019.1 VENOM 1.0.15 - metasploit Shellcode generator/compiller Venom Unix Linux 2019 venom (metasploit) shellcode generator/compiler/listener https://github.com/r00t-3xp10it/venom
FRAMEWORK DESCRIPTION The script will use msfvenom (metasploit) to generate #shellcode in different formats ( #c | #python | #ruby | #dll | #msi | #hta-psh ) injects the shellcode generated into one template (example: python) "the python funtion will execute the shellcode into ram" and uses compilers like #gcc (gnu cross compiler) or #mingw32 or #pyinstaller to build the executable file, also starts a multi-handler to recive the remote connection (shell or #meterpreter session).
'venom generator' tool reproduces some of the Technics used by Veil-Evasion.py, unicorn.py, powersploit.py, etc, etc, etc..
"P.S. some payloads are #undetectable by AV solutions... yes!!!" One of the reasons for that its the use of a function to execute the 2º stage of shell/meterpreter directly into targets ram the other reason its the use of external obfuscators/crypters.
HOW DO I DELIVER MY PAYLOADS TO TARGET HOST ? venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html that takes advantage of {iframe} {meta-http-equiv} or "{form}" tags to be able to trigger payload downloads, the user just needs to send the link provided to target host.
"Apache2 (#malicious url) will copy all files needed to your webroot"
DOWNLOAD/INSTALL
1º - Download framework from github
git clone https://github.com/r00t-3xp10it/venom.git
2º - Set files execution permitions
cd venom
sudo chmod -R +x *.sh
sudo chmod -R +x *.py
3º - Install dependencies
cd aux
sudo ./setup.sh
4º - Run main tool
sudo ./venom.sh
#MUSIC: Brothers Dreamers, KVPV Colorado (Original Mix)
#munya munya ... https://www.youtube.com/watch?v=QhAHVxn3S2k
27739000 Bytes