{"id":22647531,"url":"https://github.com/processust/venoma","last_synced_at":"2025-04-12T02:12:53.609Z","repository":{"id":217722518,"uuid":"743217934","full_name":"ProcessusT/Venoma","owner":"ProcessusT","description":"Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution","archived":false,"fork":false,"pushed_at":"2024-03-19T13:23:20.000Z","size":79886,"stargazers_count":174,"open_issues_count":1,"forks_count":36,"subscribers_count":9,"default_branch":"main","last_synced_at":"2025-04-12T02:12:31.360Z","etag":null,"topics":["antivirus","bypass","c2","cobalt","dropper","edr","indirect","malware","payload","pentest","red","strike","syscalls","team"],"latest_commit_sha":null,"homepage":"https://processus.site","language":"C++","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ProcessusT.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-01-14T17:24:27.000Z","updated_at":"2025-04-09T07:26:54.000Z","dependencies_parsed_at":"2024-02-09T13:30:57.949Z","dependency_job_id":"a294b586-93b3-4387-b2e2-521b3c475f00","html_url":"https://github.com/ProcessusT/Venoma","commit_stats":null,"previous_names":["processust/venoma"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FVenoma","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FVenoma/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FVenoma/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FVenoma/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ProcessusT","download_url":"https://codeload.github.com/ProcessusT/Venoma/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248505926,"owners_count":21115354,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["antivirus","bypass","c2","cobalt","dropper","edr","indirect","malware","payload","pentest","red","strike","syscalls","team"],"created_at":"2024-12-09T07:33:44.768Z","updated_at":"2025-04-12T02:12:53.588Z","avatar_url":"https://github.com/ProcessusT.png","language":"C++","readme":"# Venoma\n\u003cdiv align=\"center\"\u003e\n  \u003cbr\u003e\n  \u003ca href=\"https://twitter.com/intent/follow?screen_name=ProcessusT\" title=\"Follow\"\u003e\u003cimg src=\"https://img.shields.io/twitter/follow/ProcessusT?label=ProcessusT\u0026style=social\"\u003e\u003c/a\u003e\n  \u003cbr\u003e\n  \u003ch1 \u003e\n    Yet another ☠️ Cobalt Strike ☠️ beacon dropper\u003cbr /\u003e\n  \u003c/h1\u003e\n  \u003cbr\u003e\u003cbr\u003e\n\u003c/div\u003e\n\n\u003e A custom C++ raw beacon dropper with :\u003cbr /\u003e\u003cbr /\u003e\n\u003e \u003cstrong\u003eCompile Time API Hashing\u003c/strong\u003e\u003cbr /\u003e\n\u003e \u003cstrong\u003eRun-Time Dynamic Linking\u003c/strong\u003e\u003cbr /\u003e\n\u003e \u003cstrong\u003ePPID spoofing\u003c/strong\u003e\u003cbr /\u003e\n\u003e \u003cstrong\u003eDLL Unhooking (Fresh + Perun's fart)\u003c/strong\u003e\u003cbr /\u003e\n\u003e \u003cstrong\u003eETW Patching\u003c/strong\u003e\u003cbr /\u003e\n\u003e \u003cstrong\u003eEnumPageFilesW execution\u003c/strong\u003e\u003cbr /\u003e\n\u003e \u003cstrong\u003eLocal \u0026 remote APC Execution\u003c/strong\u003e\u003cbr /\u003e\n\u003e \u003cstrong\u003eIndirect syscall execution\u003c/strong\u003e\u003cbr /\u003e\n\u003e \u003cstrong\u003eCobalt Strike Artifact kit integration\u003c/strong\u003e\u003cbr /\u003e\n\u003e \u003cstrong\u003eSelf deletion\u003c/strong\u003e\u003cbr /\u003e\n\u003e \u003cbr /\u003e\n\u003cbr\u003e\n\u003ch4\u003eAll functions are included, choose what you need and remove anything else before compiling.\u003c/h4\u003e\n\u003cbr\u003e\n\u003cdiv align=\"center\"\u003e\n\u003cimg src=\"https://github.com/ProcessusT/Venoma/raw/main/assets/bypass2.png\" width=\"100%;\"\u003e\u003cbr\u003e\n\u003cimg src=\"https://github.com/ProcessusT/Venoma/raw/main/assets/demo.jpg\" width=\"100%;\"\u003e\u003cbr\u003e\n\u003cimg src=\"https://github.com/ProcessusT/Venoma/raw/main/assets/IAT%20obfuscation.jpg\" width=\"100%;\"\u003e\u003cbr\u003e\n\u003cimg src=\"https://github.com/ProcessusT/Venoma/raw/main/assets/strings.jpg\" width=\"100%;\"\u003e\u003cbr /\u003e\n\u003c/div\u003e\n\u003cbr\u003e\n\n\u003cbr /\u003e\u003cbr /\u003e\n\n## Cobalt Strike artifact kit integration\n\u003cbr /\u003e\n\u003e Compile the project and rename the binary to artifact64big.exe\u003cbr /\u003e\n\u003e Add your own artifact.cna in the same folder\u003cbr /\u003e\n\u003e Load your cna into Cobalt Strike and generate a stageless Windows payload\u003cbr /\u003e\n\u003e Enjoy\u003cbr /\u003e\nVideo tutorial here : \u003ca href=\"https://www.youtube.com/watch?v=tGa3xJymEfY\"\u003ehttps://www.youtube.com/watch?v=tGa3xJymEfY\u003c/a\u003e\n\n\u003cbr /\u003e\u003cbr /\u003e\n\n## What da fuck is this ?\n\u003cbr /\u003e\nI would learn more about antivirus evasion so I made a video on Youtube :\u003cbr /\u003e\n\u003ca href=\"https://www.youtube.com/watch?v=lFO2bPzxLGI\"\u003ehttps://www.youtube.com/watch?v=lFO2bPzxLGI\u003c/a\u003e\n\u003cbr /\u003e\u003cbr /\u003e\u003cbr /\u003e\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fprocessust%2Fvenoma","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fprocessust%2Fvenoma","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fprocessust%2Fvenoma/lists"}