Advertisement

✨🎉NEW✨VENOM✨Generate Random Persistence Module? [2020]🎉✨

✨🎉NEW✨VENOM✨Generate Random Persistence Module? [2020]🎉✨ #VENOM #Persistence #Module
venom - shellcode generator/compiler/handler (metasploit)

venom - shellcode generator/compiler/handler (metasploit)

LEGAL DISCLAMER
The author does not hold any responsibility for the bad use of this tool, remember that attacking targets
without prior consent is illegal and punished by law. So use this tool responsibly.

FRAMEWORK DESCRIPTION
The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( C# | python | ruby
dll | msi | hta-psh | docm | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into
one template (example: python) "the python funtion will execute the shellcode into ram" and uses compilers
like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a
multi-handler to recive the remote connection (shell or meterpreter session).

'venom generator' reproduces some of the technics used by Veil-Evasion.py, unicorn.py, powersploit.py, etc..

DOWNLOAD/INSTALL
1º - Download framework from github
git clone

2º - Set execution permitions
cd venom-main
sudo find ./ -name "*.sh" -exec chmod +x {} \;
sudo find ./ -name "*.py" -exec chmod +x {} \;

3º - Install all dependencies
cd aux && sudo ./setup.sh

4º - Run main tool
sudo ./venom.sh

Update venom instalation (compare local version againts github oficial version)
sudo ./venom.sh -u

Detailed info about release 1.0.16:
Suspicious-Shell-Activity© (SSA) RedTeam develop @2019

_EOF

venom,venom persistence,venom persistence module,kali venom persistence,kali linux venom persistence,linux venom persistence,NEW VENOM Generate Random Persistence Module,VENOM Generate Random Persistence,venom - shellcode generator/compiler/handler (metasploit),venom - shellcode generator,venom shellcode generator,venom shellcode,venom payload generator,venom payload,venom hack,venom payloads,venom metasploit,venom handler,

Post a Comment

0 Comments