The script will use msfvenom (metasploit) to generate shellcode in different formats ( C# | python | ruby | dll | msi | hta-psh | doc | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python function will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a handler to receive the remote connection (shell or meterpreter) venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html to be hable to trigger payload downloads, the user just needs to send the link provided to target host.

Features

  • The script will use msfvenom (metasploit) to generate shellcode
  • 'venom' reproduces some of the technics used by Veil-Evasion.py
  • venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN)
  • Apache2 (malicious url) will copy all files needed to your webroot, and starts apache for you
  • Set execution permissions

Project Samples

Project Activity

See All Activity >

License

MIT License

Follow VENOM C2 shellcode

VENOM C2 shellcode Web Site

Other Useful Business Software
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of VENOM C2 shellcode!

Additional Project Details

Programming Language

Unix Shell

Related Categories

Unix Shell Post-Exploitation Frameworks

Registered

2023-06-07