The script will use msfvenom (metasploit) to generate shellcode in different formats ( C# | python | ruby | dll | msi | hta-psh | doc | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python function will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a handler to receive the remote connection (shell or meterpreter) venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html to be hable to trigger payload downloads, the user just needs to send the link provided to target host.
Features
- The script will use msfvenom (metasploit) to generate shellcode
- 'venom' reproduces some of the technics used by Veil-Evasion.py
- venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN)
- Apache2 (malicious url) will copy all files needed to your webroot, and starts apache for you
- Set execution permissions