Closed usama7628674 closed 4 years ago
iam current working in venom 1.0.16 version .. many of venom payloads are now beeing caugth by AV soluctions .. (so fix that pyinstaller error in your distro does not matter now)..
venom V:1.0.16 will present 4 new evasion payloads <-- play with this ones insted .. (release date preview: agost)
Don't worry I can make them FUD
@r00t-3xp10it I'm getting the following error if I run .py file (not converted to .exe)
Traceback (most recent call last):
File "shellcode.py", line 19, in <module>
iKaiRSdDk()
WindowsError: exception: access violation writing 0x02FA9CE8
This maybe due to ctypes module.
yes ...maybee.. i have now finished all pending projects .. i can now return to venom v:1.0.16 release ..
@r00t-3xp10it Sounds good.
Question: Did you have copy the shellcode from venom terminal to exec.py file and then saved the file? because i have reproduced your steps: Used pyinstaller for compilation,didn't use pyherion and nxcrypt. And i have try to run it againts my windows 7 (inside wine) and the payload have successfully connected back..
OR maybee your 'wine' its not configurated for 'windows 10' versions and that give the bug ?
@r00t-3xp10it Hmmm let me check again and we'll continue discussion later then.
@r00t-3xp10it I have exactly the same unsolved problem, the payload does not work.
Did you have copy the shellcode from venom terminal to exec.py file and then saved the file?
Does your wine its configurated to use the same target arch ?? example: if your target its windows10 then set wine to windows10 .. . also: why are you using an old payload ?? that build its flagged by most anti-virus solluctions, because they have a signature of that build in there databases ..(its a waste of time) ..
here are the new payloads: https://github.com/r00t-3xp10it/venom/releases/tag/v1.0.16
@r00t-3xp10it Not getting meterpreter shell Windows payload with agent 3 PY(Pyherion/NXcrypt) Tested on windows 10 v1809 and v1903 Used pyinstaller for compilation,didn't use pyherion and nxcrypt.