-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathREADME.txt
34 lines (28 loc) · 1.43 KB
/
README.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
____ ____ ____ _______
\ \ / /____ ____ ____ _____ /_ | \ _ \
\ Y // __ \ / \ / _ \ / \ | | / /_\ \
\ /\ ___/| | ( <_> ) Y Y \ | | \ \_/ \
\___/ \___ >___| /\____/|__|_| / |___| /\ \_____ /
\/ \/ \/ \/ \/
Program: Venom Exploit Builder
Version: 1.0
Language: Visual Basic .NET
.NET Framework: 4.8
Overview:
Venom Exploit Builder is a program that aims to bypass SmartScreen filters by embedding download
instructions into files such as...
LNK --- Windows Shortcut
HTA --- HTML Application
VBS --- Visual Basic script
BAT --- Windows Batchfile
CMD --- Windows Command script
Once the command is executed, the payload is downloaded into the Temporary Files directory and
executed. Each file-type supports a download request using with various Powershell invokations
or via the system BitsAdmin command.
Note: BitsAdmin can be finickey and requires a filename/extension in the URL.
Bad URL: http://www.example.com/files/myscript
OK URL: http://www.example.com/files/myscript.exe
Updates:
In the future I will add updates to this, including using CertUtil (Windows Certificate Utility)
as a third delivery method to download files. I'll also do my best to keep each payload FUD and
uneffected by SmartScreen filters.