Giter VIP home page Giter VIP logo

venom's Introduction

Version Stage Build licence lastupdated languages Open issues

VENOM 1.0.17 - metasploit Shellcode generator/compiller

Version release : v1.0.17
Author : pedro ubuntu  [ r00t-3xp10it ]
Codename: Aconite (Aconitum napellus)
Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS
Suspicious-Shell-Activity (SSA) RedTeam develop @2019

banner

LEGAL DISCLAMER

The author does not hold any responsibility for the bad use of this tool, remember that attacking
targets without prior consent is illegal and punished by law. So use this tool responsibly.

FRAMEWORK DESCRIPTION

The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( C# | python
| ruby | dll | msi | hta-psh | docm | apk | macho | elf | deb | mp4 | etc ) injects the shellcode
generated into one template (example: python) "the python funtion will execute the shellcode into
ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the
executable file. It also starts an handler to recive the remote connection (shell or meterpreter)

'venom' reproduces some of the technics used by Veil-Evasion.py, unicorn.py, powersploit.py, etc..

HOW DO I DELIVER MY PAYLOADS TO TARGET HOST ?

venom 1.0.11 (malicious_server) was build to take advantage of apache2 webserver to deliver payloads
(LAN) using a fake webpage writen in html that takes advantage of <iframe> or <form> to be hable to
trigger payload downloads, the user just needs to send the link provided to target host.

"Apache2 (malicious url) will copy all files needed to your webroot, and starts apache for you."

venom shellcode v1.0.17

DEPENDENCIES

Zenity|Metasploit|GCC (compiler)|Pyinstaller (compiler)|mingw32 (compiler)|pyherion.py (crypter)
wine (emulator)|PEScrambler.exe (PE obfuscator)|apache2 (webserver)|winrar (wine)|shellter (KyRecon)
vbs-obfuscator (obfuscator)|avet (Daniel Sauder)|ettercap (MitM + DNS_Spoofing)|icmpsh (ICMP shell)
openssl (build SSL certs)|CarbonCopy (sign exe binarys)|ResourceHacker (wine)|NXcrypt(python crypter)

"venom will download/install all dependencies as they are needed". Adicionally was build the script
venom-main/aux/setup.sh to help you install all framework dependencies fast and easy.We just need to
install first the most importante dependencies before trigger setup.sh = zenity, metasploit, ettercap

DOWNLOAD/INSTALL

1º - Download framework from github
git clone https://github.com/r00t-3xp10it/venom.git

2º - Set execution permissions
cd venom
sudo find ./ -name "*.sh" -exec chmod +x {} \;
sudo find ./ -name "*.py" -exec chmod +x {} \;

3º - Install all dependencies
cd aux && sudo ./setup.sh

4º - Run main tool
sudo ./venom.sh

Update venom instalation (compare local version againts github oficial version)
sudo ./venom.sh -u

Framework Main Menu

banner venom shellcode v1.0.17


Detailed info about release 1.0.17: https://github.com/r00t-3xp10it/venom/releases
Suspicious-Shell-Activity© (SSA) RedTeam develop @2019

_EOF

venom's People

Contributors

chaitanyaharitash avatar r00t-3xp10it avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

venom's Issues

windows agent 3 not working

@r00t-3xp10it Not getting meterpreter shell
Windows payload with agent 3 PY(Pyherion/NXcrypt)
Tested on windows 10 v1809 and v1903
Used pyinstaller for compilation,didn't use pyherion and nxcrypt.

ERREUR

hello i think i have an error during the installation because when i leave the script i have :
[☠] Exit Console -> Stoping Services...
./venom.sh: 10746: ./venom.sh: /etc/init.d/metasploit: not found
[☠] Report-Bugs: https://github.com/r00t-3xp10it/venom/issues
please help me

Hta payloads not working

Install and ran venom select windows payloads and used agent 9 (HTA-PSH) and upon running .hta file on windows pc I didn't get any meterpreter shell.

Tested on Windows 10 v1809 (updated)

Structure of Update-KB457147.ps1

Hi r00t-3xp10it!

I just wanted to understand that in your powershyell script (Amsi Evasion File less stager one),
Where are the Lhost and Lport values? And can you give me a good tutorial on how to make a backdoor in powershell?

Here is the screenshot of your powershell script.
Capture

debian ?

tried using venom on debian testing "wine 32",
had to tweak venom.sh script to accept pyinstaller.3.2.1 which worked but keeps giving errors.

plus any workaround to use venom on "Debian" or is it a kali only thing?

thx in adv.

unable to locate pywin,python,pyinstaller,winrar

When I run setup.sh script I get this.

[✔] zenity............................[ found ]
[✔] msfconsole........................[ found ]
[✔] gcc compiler......................[ found ]
[✔] mingw64 compiler..................[ found ]
[✔] pyherion crypter..................[ found ]
[✔] vbs-obfuscator....................[ found ]
[✔] apache2 webserver.................[ found ]
[!] Venom Domain name Configuration...[ skipp ]
[✔] ettercap settings.................[ IPv4 ]
[✔] wine64............................[ found ]
[✔] wine folder.......................[ found ]
[✔] arch sellected....................[ 64bit ]
[x] WinRAR.exe [ not found ]

0009:fixme:heap:RtlSetHeapInformation 0x250000 0 0x23fd30 4 stub
0009:fixme:shell:SHAutoComplete stub
0009:fixme:ieframe:PersistStreamInit_InitNew (0x669e0)
Could not load wine-gecko. HTML rendering will be disabled.
0009:err:mshtml:create_document_object Failed to init Gecko, returning CLASS_E_CLASSNOTAVAILABLE
0009:fixme:ole:CoCreateInstanceEx no instance created for interface {00000000-0000-0000-c000-000000000046} of class {25336920-03f9-11cf-8fd0-00aa00686f13}, hres is 0x80040111
0009:fixme:ieframe:handle_navigation_error Navigate to error page
0009:fixme:ieframe:bind_to_object BindToObject failed: 800c0010
0009:fixme:shell:BrsFolder_OnCreate flags BIF_NEWDIALOGSTYLE partially implemented
0009:fixme:ntdll:server_ioctl_file Unsupported ioctl 24000 (device=2 access=1 func=0 method=0)
0009:fixme:exec:SHELL_execute flags ignored: 0x00000180
0009:fixme:ieframe:OleInPlaceObject_UIDeactivate (0x669e0)
0009:fixme:ieframe:OleInPlaceObject_InPlaceDeactivate (0x669e0)

003e:fixme:heap:RtlSetHeapInformation 0x240000 0 0x23fd30 4 stub

WARNING: Unable to locate WinRAR
Please Download WinRAR to: venom-main/bin
https://github.com/r00t-3xp10it/venom/blob/master/bin/install_winrar_wine64.exe

[x] pyinstaller [ not found ]
Copy to: /drive_c/pyinstaller-2.0
[x] pywin32-220 [ not found ]

Install: python-2.6.6.amd64.msi

002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
0054:fixme:ntdll:NtLockFile I/O completion on lock not implemented yet
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
0054:err:mscoree:LoadLibraryShim error reading registry key for installroot
0054:err:mscoree:LoadLibraryShim error reading registry key for installroot
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
0054:err:mscoree:LoadLibraryShim error reading registry key for installroot
0054:err:mscoree:LoadLibraryShim error reading registry key for installroot
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
0056:fixme:nstc:NSTC2_fnSetControlStyle2 mask & style (0x00000004) contains unsupported style(s): 0x00000004
0056:fixme:shell:IShellBrowser_fnSendControlMsg stub, 0x3d5a0 (2, 1026, a003, 0, 0x23ee30)
0056:fixme:shell:IShellBrowser_fnSendControlMsg stub, 0x3d5a0 (2, 1026, a004, 1, 0x23ee30)
0056:fixme:shell:IShellBrowser_fnSendControlMsg stub, 0x3d5a0 (2, 1025, a003, 1, 0x23ee30)
0056:fixme:shell:IShellBrowser_fnSendControlMsg stub, 0x3d5a0 (2, 1025, a004, 1, 0x23ee30)
0054:err:msi:ITERATE_Actions Execution halted, action L"MaintenanceTypeDlg" returned 1602

Install: pywin32-220.win-amd64-py2.6.exe

wine: Unhandled page fault on read access to 0x7f1128525320 at address 0x7f112aa1af97 (thread 002c), starting debugger...
0009:fixme:heap:RtlSetHeapInformation 0x250000 0 0x23fd30 4 stub

002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!
002c:err:hid_report:process_hid_report Device reports coming in too fast, last report not read yet!

WARNING: Unable to locate pywin32-220 (x64)
Please Download/Install the follow packets
python-2.6.6.amd64.msi
pywin32-220.win-amd64-py2.6.exe

wine: Unhandled page fault on read access to 0x7fada7be4320 at address 0x7fadb6182f97 (thread 002c), starting debugger...
002c:err:seh:start_debugger Couldn't start debugger ("winedbg --auto 32 88") (1115)
Read the Wine Developers Guide on how to set up winedbg or another debugger
[✔] Rebuild toolkit settings file.....[ done ]
sed: -e expression #1, char 0: no previous regular expression
[✔] All checks completed..............[ done ]

Report-Bugs: https://github.com/r00t-3xp10it/venom/issues

Even though they are installed in wine/drive_c directory.I have also tried on live kali and parrot os but still no luck.
Version 1.0.14 works fine though.

Unable to locate pywin32-220 (x64)

Hi

during install venom i got this error:

WARNING: Unable to locate pywin32-220 (x64)
Please Download/Install the follow packets
python-2.6.6.amd64.msi
pywin32-220.win-amd64-py2.6.exe

this is my install log:


\ \ //| || \ | |/ | \ / |
\ // | || | || || / |
_
/ |
||/_|_/|__/_/|__|
╔───────────────────────────────────────────╗
| "setup.sh - configuration script" |
| |
| Use this script to configure venom.sh |
| internal settings, like the installation |
| of dependencies, mega-upload domain name |
| path to apache2 webroot, wine install... |
| |
╠───────────────────────────────────────────╝
| OS:Linux DISTRO:Kali(x64) VERSION:1.0.14
|
BROADCAST:eth0 IP_ADDR:192.168.1.206

[✔] zenity............................[ found ]
[✔] msfconsole........................[ found ]
[✔] gcc compiler......................[ found ]
[✔] mingw64 compiler..................[ found ]
[✔] pyherion crypter..................[ found ]
[✔] vbs-obfuscator....................[ found ]
[✔] apache2 webserver.................[ found ]

[☆] Building -> venom mega-upload.conf
[☆] Building -> venom domain directory
[☆] Added -> DNS record to etter.dns
[☆] DOMAIN_NAME -> mega-upload.com
[☆] ATTACK_VECTOR -> http://mega-upload.com
[☆] APACHE_WEBROOT -> /root/venom/aux/public_html/mega-upload.com

Enabling site mega-upload.
To activate the new configuration, you need to run:
systemctl reload apache2

[✔] ettercap settings.................[ IPv4 ]
[✔] wine64............................[ found ]
[✔] wine folder.......................[ found ]
[✔] arch sellected....................[ 64bit ]
[x] WinRAR.exe [ not found ]

fixme:service:scmdatabase_autostart_services Auto-start service L"MountMgr" failed to start: 2
fixme:heap:RtlSetHeapInformation 0x230000 0 0x22fcd0 4 stub
fixme:shell:SHAutoComplete stub
fixme:ieframe:PersistStreamInit_InitNew (0x626f0)
Could not load wine-gecko. HTML rendering will be disabled.
err:mshtml:HTMLDocument_Create Failed to init Gecko, returning CLASS_E_CLASSNOTAVAILABLE
fixme:ole:CoCreateInstanceEx no instance created for interface {00000000-0000-0000-c000-000000000046} of class {25336920-03f9-11cf-8fd0-00aa00686f13}, hres is 0x80040111
fixme:ieframe:handle_navigation_error Navigate to error page
fixme:ieframe:bind_to_object BindToObject failed: 800c0010
fixme:exec:SHELL_execute flags ignored: 0x00000180
fixme:ieframe:OleInPlaceObject_UIDeactivate (0x626f0)
fixme:ieframe:OleInPlaceObject_InPlaceDeactivate (0x626f0)

fixme:heap:RtlSetHeapInformation 0x240000 0 0x23fcd0 4 stub

WARNING: Unable to locate WinRAR
Please Download WinRAR to: venom-main/bin
https://github.com/r00t-3xp10it/venom/blob/master/bin/install_winrar_wine64.exe

[x] pyinstaller [ not found ]
fixme:nstc:NSTC2_fnSetControlStyle2 mask & style (0x00000004) contains unsupported style(s): 0x00000004
fixme:shell:IShellBrowser_fnSendControlMsg stub, 0x3b140 (2, 1026, a003, 0, 0x23ede0)
fixme:shell:IShellBrowser_fnSendControlMsg stub, 0x3b140 (2, 1026, a004, 1, 0x23ede0)
fixme:shell:IShellBrowser_fnSendControlMsg stub, 0x3b140 (2, 1025, a003, 1, 0x23ede0)
fixme:shell:IShellBrowser_fnSendControlMsg stub, 0x3b140 (2, 1025, a004, 1, 0x23ede0)
fixme:shell:IExtractIconW_fnExtract (0x4b3b0) (file=L"C:\windows\system32\shell32.dll" index=-35 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x55330) (file=L"C:\windows\system32\shell32.dll" index=-16 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x521b0) (file=L"C:\windows\system32\shell32.dll" index=-235 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x521e0) (file=L"@C:\windows\system32\shell32.dll" index=-33 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x577b0) (file=L"C:\windows\system32\shell32.dll" index=-9 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x5be30) (file=L"C:\windows\system32\shell32.dll" index=-4 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x5e9b0) (file=L"C:\windows\system32\shell32.dll" index=-4 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x5e990) (file=L"C:\windows\system32\shell32.dll" index=-4 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x577e0) (file=L"C:\windows\system32\shell32.dll" index=-4 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x5e650) (file=L"C:\windows\system32\shell32.dll" index=-4 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x5bb60) (file=L"C:\windows\system32\shell32.dll" index=-4 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x56f10) (file=L"C:\windows\system32\shell32.dll" index=-4 (nil) 0x23ebb8 size=00000014) semi-stub
fixme:shell:IExtractIconW_fnExtract (0x5e5e0) (file=L"C:\windows\system32\shell32.dll" index=-4 (nil) 0x23ebb8 size=00000014) semi-stub
Copy to: /drive_c/pyinstaller-2.0
[x] pywin32-220 [ not found ]

Install: python-2.6.6.amd64.msi

fixme:service:scmdatabase_autostart_services Auto-start service L"MountMgr" failed to start: 2
fixme:ntdll:NtLockFile I/O completion on lock not implemented yet
err:mscoree:LoadLibraryShim error reading registry key for installroot
err:mscoree:LoadLibraryShim error reading registry key for installroot
err:mscoree:LoadLibraryShim error reading registry key for installroot
err:mscoree:LoadLibraryShim error reading registry key for installroot
fixme:heap:RtlSetHeapInformation 0x6a0000 0 0x22ec10 4 stub
fixme:msi:ITERATE_CreateShortcuts poorly handled shortcut format, advertised shortcut
fixme:msi:ITERATE_CreateShortcuts poorly handled shortcut format, advertised shortcut
fixme:msi:ITERATE_CreateShortcuts poorly handled shortcut format, advertised shortcut

Install: pywin32-220.win-amd64-py2.6.exe

fixme:heap:RtlSetHeapInformation 0x230000 0 0x22fcd0 4 stub
fixme:msvcrt:__clean_type_info_names_internal (0x1e296510) stub
fixme:msvcrt:__clean_type_info_names_internal (0x1e296510) stub
err:winediag:SECUR32_initNTLMSP ntlm_auth was not found or is outdated. Make sure that ntlm_auth >= 3.0.25 is in your path. Usually, you can find it in the winbind package of your distribution.
fixme:msvcrt:__clean_type_info_names_internal (0x1e4e6558) stub
fixme:msvcrt:__clean_type_info_names_internal (0x1ece54a8) stub
fixme:msvcrt:__clean_type_info_names_internal (0x1e87e3c0) stub
fixme:msvcrt:__clean_type_info_names_internal (0x1ebfba00) stub
fixme:msvcrt:__clean_type_info_names_internal (0x1e8df0f8) stub
fixme:msvcrt:__clean_type_info_names_internal (0x9417f88) stub
fixme:msvcrt:__clean_type_info_names_internal (0x1e7c1090) stub
fixme:msvcrt:__clean_type_info_names_internal (0x1e296510) stub

WARNING: Unable to locate pywin32-220 (x64)
Please Download/Install the follow packets
python-2.6.6.amd64.msi
pywin32-220.win-amd64-py2.6.exe

[✔] Rebuild toolkit settings file.....[ done ]
sed: -e expression #1, char 0: no previous regular expression
[✔] All checks completed..............[ done ]

Report-Bugs: https://github.com/r00t-3xp10it/venom/issues

Agent 3 Windows

agent 3 windows does not work. I have no feedback on the metasploit console.

生成exe报错,安装依赖报错

As soon as I run the generated windows exe, it shows that it has stopped working. How to solve the problem is that Kali 2019.4 can't install venom. When installing its relevant environment, it directly reports an error。

Rescrape function gone

This happened a while back and was fixed but has gone again. Once an item has scanned sources, there's no option to rescan again. This is in library items, not sure if present everywhere in the addon.

Thanks

Macro Virus in Venom?

Is there a macro virus in venom shell code generator or not?

And other thing I wanted to ask that Can we compile a Python Script to Powershell Script (.ps1) or to a Macro Virus (.xml)

problem in getting a connection on public network / WAN

Hi, i want to access a connection from a different network by sending a payload containing my ip address. And send using the http port forwarding service, namely LocalXpose, but I don't seem to get a return connection from the target.
Localhost
1

port forwading service
2

Listener
3

I tried the method above and it might not work. So I have to use tcp. So the payload use localxpose port and i as listener use my local port. Okay, This is my problem, when I use the tcp port provided by localxpose. it will also be used as a listener. so how can I switch that listener back to my localhost. The listener should use my local port but i can't change it.

Script execution aborted

Its not installing the dependices and saying execution aborted.
If anyone knows how to solve it so please help me.

Error Connecting to Posgresql Database (metasploit)

bug description

New upgrade in postgresql-9.6 have changed the default access port from 5432 to 5433
and stoped the support of postgresql in localhost (127.0.0.1), this article explains
how to fix the postgresql database connection issue of metasploit in kali linux distros.

Metasploit database error connecting to postgresql service/port(5432)
postgresql error
postgresql error




msfdb connection Fix (manual)

1º - Locate postgresql configuration files (9.5 and 9.6)

locate postgresql.conf

2º - Edit configuration files

nano /etc/postgresql/9.6/main/postgresql.conf

3º - Search for '''port''' inside the postgresql.conf
And change the next values: [ listen_addresses | port | unix_socket_permissions ]
postgresql error

4º - Start postgresql service

service postgresql start
service postgresql status

postgresql error

5º - Check if port 5432(postgresql) its listenning on 'localhost'

ss -ant | grep 5432

postgresql error

6º - Delele old database (database.yml) configurations
"This next step will delete all hosts/creds/etc current stored into current db"

msfdb delete

7º - Creating new database.yml
"No need to enter any value (username:password), all proccess its automatized"

msfdb init

postgresql error

8º - Start metasploit console

msfconsole

9º - Check connection to database

db_status

postgresql error



_EOF

no payload generated when using templaye.py

hi folks,
thx a lot for this great tool, very intersting.
i am running kali 2020b and i had no issues to install and run venom framework.
one thing i ve noticed, all obfuscated payload don t work, never get a session open, and also form some of them when i want to have an exe out and not a .bat i get this error, sayin that there are no such file venom/output/dist/template.exe
here is the last payload log i ve generated, and nothing in /output
Generated key:f9bqOnSlVLWZnIszGFg3DOFcaF3Kur7vTvprFDNEEQqzeZFXXV12q6f9gGqvT7aXSkoqJZ

[☠] pyinstaller -> found!
[☠] compile template.py -> Ossl64b.exe
cp: impossible d'évaluer '/home/nocomp/tools/evasion/venom/output/dist/template.exe': Aucun fichier ou dossier de ce type
[☠] Start a multi-handler...
[☠] Press [ctrl+c] or [exit] to 'exit' meterpreter shell
[☯] Please dont test samples on virus total...

anything i should do check?
running 64b version

thank you for your time

I cant do installation

Hi when i try to install venom I entered
cd venom-main
But it doesnt work. it showed " bash: cd: venom-main: No such file or directory "
any help here
Thank you

{xterm} not found

./venom.sh: 7221: ./venom.sh: xterm: not found

help me to solve it

installing dependencies

I can't install dependencies.

resize: Time out occurred
[x] zenity............................[ NOT found ]
[i] Please Wait, installing dependencie...
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Unable to locate package zenity
[x] Script execution aborted ..

No Pop up Prompting For my IP when generating Android Link on VENOM shell Code!!

Hello there!

I have installed and configured everything on my Kali Lnux and have also installed VENOM SHELLCODE GENERATOR on it to test how it funtions...But when i try to generate the link it never pops up the window that will prompt me to add my IP and Port to conect with Meterexploit- i configured everything currectly and i am "root" but it keeps Aborting ...what am i doing wrong..Someone should help me.
It ends up like this below and nothing pops up: BUT ONE THING IS THAT ./setup.sh never installed

  • it keeps aborting.

[☠] Shellcode Generator
[➽] Chose Agent number:1
[☠] Enter shellcode settings!
[x] Abort module execution ..
[☠] Loading Android|IOS agents ..

Below is my configurations! meanwhile ./setup.sh always abort when i try to run it.


@kali:/venom# chmod +x venom.sh
@kali:
/venom# ls
aux bin obfuscate output README.md settings templates venom.sh
@kali:/venom# cd aux
@kali:
/venom/aux# ls
dump_credentials_linux.rc fast_migrate.rc persistence.rc
dump_credentials.rc Invoke-Shellcode.py privilege_escalation.rc
enum_system.rc linux_hostrecon.rc setup.sh
etter.dns msf stop_logfiles_creation.rc
exploit_suggester.rc persistence2.rc sysinfo.rc
@kali:/venom/aux#
@kali:
/venom/aux# ./setup.sh
[x] Script execution aborted ..
@kali:~/venom/aux#


Hope someone will help me out and figure out what i am doing wrong.
Thanks in advance.

fix ubuntu mingw32 repository install

This package is in universe repository of Ubuntu .
so make sure you have enable universe in /etc/apt/sources.list use command :
sudo apt-get install mingw32

it will install packages mingw32 mingw32-binutils mingw32-runtime automatically
sudo apt-cache search mingw32

mingw32 - Minimalist GNU win32 (cross) compiler
mingw32-binutils - Minimalist GNU win32 (cross) binutils
mingw32-runtime - Minimalist GNU win32 (cross) runtime

no need to select one. these packages are dependency of mingw32

Note : currently these package available in trusty , utopic and earlier version of Ubuntu
if you are using latest Ubuntu version then check Ubuntu package search that package
available or not . if not then either download package and install manually or download
source and compile it.

for 32bit system:

wget http://archive.ubuntu.com/ubuntu/pool/universe/m/mingw32/mingw32_4.2.1.dfsg-2ubuntu1_i386.deb
wget http://archive.ubuntu.com/ubuntu/pool/universe/m/mingw32-binutils/mingw32-binutils_2.20-0.2ubuntu1_i386.deb
wget http://archive.ubuntu.com/ubuntu/pool/universe/m/mingw32-runtime/mingw32-runtime_3.15.2-0ubuntu1_all.deb

for 64bit system

wget http://archive.ubuntu.com/ubuntu/pool/universe/m/mingw32/mingw32_4.2.1.dfsg-2ubuntu1_amd64.deb
wget http://archive.ubuntu.com/ubuntu/pool/universe/m/mingw32-binutils/mingw32-binutils_2.20-0.2ubuntu1_amd64.deb
wget http://archive.ubuntu.com/ubuntu/pool/universe/m/mingw32-runtime/mingw32-runtime_3.15.2-0ubuntu1_all.deb

install these packages using command :
sudo dpkg -i *.deb

if it shows dependencies then use command :
sudo apt-get install -f

and again install
sudo dpkg -i *.deb


Special thanks to team menber: Chaitanya Haritash

Venom Openssl listener session resume persistence

problem
Dear,
i'm using, for a penetartion test, the venom openssl (option 8 and then 2 on venom) in persistence mode.
It's working perfectly but i don't know how i can resume the session (handler).
Also i have a problem on target with ftp cmd command, when i run it he go on "freeze" without possible to exit and return on norml cmd command.
Any idea for how i cn resolve it without closing the session?
thank you.
Best regards.

Listener not starting on Amsi Evasion Payload Number 1

Hi!

I am using that File Less Payload in Amsi-Evasion Module, The payload gets delivered successfully and I start the .ps1 script with the PowerShell On target computer, It executes successfully but on the kali side it shows Press Any Key to start Handler, I press key and the Handler doesnt starts only, How can i start the listener manually? For The ps1 script?

not show the URL http://192.168.1.100/Download.html

Hi, i want to open the url and give me alert in web browser:
"""""
Not Found
The requested URL was not found on this server.

Apache/2.4.46 (Debian) Server at 192.168.1.100 Port 80

""""""

This is my settings on AMSI BYPASS:
[i] AMSI MODULE SETTINGS

LPORT    : 666                                                                                                                                                    
LHOST    : 192.168.1.100                                                                                                                                         
LOLBin   : WinHttpRequest                                                                                                                                         
DROPPER  : /root/Toolswork/Bypass/venom/output/Update-KB1234.ps1                                                                                                  
AGENT    : /root/Toolswork/Bypass/venom/output/Security-Update.ps1                                                                                                
UPLOADTO : Fileless (trigger:tmp)                                                                                                                                 
SILENT EXECUTION : OFF    

can't make make_avet.c & sh_format.c

Hi, i'm problem in the avet instalation, i use option number 17 in windows-os payloads. when i run the payload give me error in avet installation:
gcc: error: make_avet.c: No such file or directory
gcc: fatal error: no input files
compilation terminated.
gcc: error: sh_format.c: No such file or directory
gcc: fatal error: no input files
compilation terminated.

Problem setting up pytohn 2.6.6

I try to set up the directory in python 2.6.6 from the script and I get this error in the terminal:0026:err:msi:ACTION_CallDllFunction failed to load dll L"C:\\users\\root\\Temp\\msic5e7.tmp" (193) Can someone help me please?

where put dns

i have just a question "is it possible to write dns adress in LHOST ? "
1

fix kali 2.0 (rolling) mingw32 repository install

Description

KALI '''rolling release''' does not have in repositorys the mingw32 packet needed by venom to compile templates into executable formats, the packet that venom needs its a sub-packet of mingw32 (i586-mingw32msvc-gcc) it can be found in KALI sana oficial repositorys simple by executing: apt-get install mingw32

Simple soluction:

edit your source.list and add KALI sana official repositorys to it.
that apt-get install mingw32 it will install the missing packets that
venom needs to work (32 or 64 archs)...

Install mingw32 on kali 2.0 (step-by-step):

1º - edit /etc/apt/sources.list
2º - comment (#) default repositories
3º - add the follow repositorie to your source.list

deb http://old.kali.org/kali sana main non-free contrib
deb-src http://old.kali.org/kali sana main non-free contrib

4º - save source.list file
5º - apt-get update
6º - apt-get install mingw32 (OR mingw64)

revert repository to default:

7º - edit /etc/apt/sources.list
8º - remove follow lines from source.list

deb http://old.kali.org/kali sana main non-free contrib
deb-src http://old.kali.org/kali sana main non-free contrib

9º - un-comment the default repositories
10º - save source.list file
11º - apt-get update

More info can be found in kali official website:

kali-linux-sources-list-repositories



Or install mingw-w64 (64bits systems)

This soluction does not need any source.list changes ..

apt-get update
apt-get install mingw-w64 -y

Reason died

i am trying to create a payload or pdf malware to hack an android mobile but result is

Reason Died

Venom - android jarsigner not found

hi help
when i chose android module in venom

  ./venom.sh: 11915: /etc/init.d/metasploit: not found

and

  [x] Abort module execution ..

Why ? please help

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.