The script will use Msfvenom from Metasploit to generate shellcode in differents formats such as "c", "python", "ruby", "dll", "msi", "hta-psh" in order to injects the shellcode generated into one template and work with encrypted payloads.

The python funtion will execute the shellcode into ram and uses compilers like gcc or mingw32 or pyinstaller to build the executable file, and will start a Metasploit multi-handler session to receive the remote connection.


# Download framework from github
git clone

# Set files execution permitions
cd venom
sudo chmod -R +x *.sh
sudo chmod -R +x *.py

# Install dependencies
cd aux
sudo ./
sudo ./

Once the tool has been launched, it will prompt you to press "Enter" to continue for proceed further options.


The next screen will show you the information about the Option Built, the target machine, the payload format and the and output. There is 7 differents type of option builds shellcode listed. We are going to use the shellcode "number 4" for the purpose of this demonstration.


Simply choose the Venom shellcode "number 4" and press "enter" to continue.


You will need now to choose your agent referal. For this payload Venom offer you two options. Select the one that you want to use between Android and IOS. On our side we will select the agent "number 1" for the purpose of this demonstration.


We will need now to setup the local host IP address along with the local port. Now enter your local machine IP address and local port which will be used by the payload for listening. For your information local IP address and local port are amways refered as "LHOST" and "LPORT" exactly like Metasploit.

bypass-antivirus-detection-with-encrypted-payloads-using-venom bypass-antivirus-detection-with-encrypted-payloads-using-venom

It's now the time to give a name to our payload which will be used to save it and to define the way we want the payload to be deliver.

bypass-antivirus-detection-with-encrypted-payloads-using-venom bypass-antivirus-detection-with-encrypted-payloads-using-venom


At this stage we can say that you are almost done ! A new terminal will automatically start a session of Metasploit allowing you to conduct your attack with the encrypted Payload.



If you have any questions about this article or if you want to share your thoughts with us, please feel free to do it using the below comment form.