The script will use msfvenom (metasploit) to generate shellcode in different formats ( C# | python | ruby | dll | msi | hta-psh | doc | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python function will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a handler to receive the remote connection (shell or meterpreter) venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN) using a fake webpage writen in html to be hable to trigger payload downloads, the user just needs to send the link provided to target host.

Features

  • The script will use msfvenom (metasploit) to generate shellcode
  • 'venom' reproduces some of the technics used by Veil-Evasion.py
  • venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads (LAN)
  • Apache2 (malicious url) will copy all files needed to your webroot, and starts apache for you
  • Set execution permissions

Project Samples

Project Activity

See All Activity >

License

MIT License

Follow VENOM C2 shellcode

VENOM C2 shellcode Web Site

Other Useful Business Software
Earn up to 15% annual interest with Nexo. Icon
Earn up to 15% annual interest with Nexo.

Access competitive interest rates on your digital assets.

Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of VENOM C2 shellcode!

Additional Project Details

Programming Language

Unix Shell

Related Categories

Unix Shell Post-Exploitation Frameworks

Registered

2023-06-07