Okay, let’s talk about this Venom thing. I heard about it a while back and thought, “Why not give it a shot?” It’s supposed to be this tool for setting up a network of proxies. Sounds cool, right? So, I decided to dive in and see what it’s all about.

Getting Started
First things first, I needed to grab the files. I went over to their GitHub page, found the latest release, and downloaded the version for my system. It was a simple zip file, nothing too crazy. Once I had it, I just unzipped it to a folder on my computer. Easy peasy.
Setting Up the Admin Node
The first step in the process was firing up an admin node. This is like the control center for the whole operation. I opened up my terminal and navigated to the folder where I unzipped Venom. Then, I ran the command to start the admin node. I think it was something like ./admin_linux_x64
since I’m on Linux. The terminal spit out a bunch of text, and I saw it generating some keys and listening on a port.
Connecting Agent Nodes
With the admin node running, it was time to connect some agent nodes. These are the workhorses that create the proxy network. I opened another terminal window and ran a similar command to start an agent node, but I had to specify the address of the admin node. It looked something like ./agent_linux_x64 -raddr 192.168.1.100:9000
. The agent connected to the admin, and I saw some logs confirming the connection on both sides.
Testing the Network
Now for the fun part – testing it out! In the admin node’s interactive console, I listed the nodes using the show
command to make sure all the agent nodes were showing up. Then, I used the goto
command to jump to a specific agent node. Once I was “inside” an agent node, I could start playing with the proxy settings.
- socks5: I tried setting up a socks5 proxy using the
socks5
command, followed by the port I wanted to use. - lforward/rforward: There were also options for local and remote forwarding.
I spent some time testing different configurations, forwarding ports, and basically just poking around to see how everything worked.

Wrapping Up
After a few hours of tinkering, I had a decent grasp of how Venom works. It’s a pretty neat tool for creating a network of proxies, and the command-line interface is straightforward once you get the hang of it. There’s a lot more you can do with it, like setting up reverse shells and all that, but I just wanted to get a feel for the basics first. Overall, it was a fun little project, and I learned a thing or two along the way. I would highly recommend any friend who has the same interests give it a try.