t3l3machus / Villain

Villain is a high level stage 0/1 C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
Other
3.64k stars 590 forks source link

Ignoring unsupported arguments: OBFUSCATE #118

Closed AdMediastic closed 1 year ago

AdMediastic commented 1 year ago

This is the error I am getting! image

t3l3machus commented 1 year ago

@AdMediastic Functions like "obfuscate" and "encode" are enabled for each payload from the "attrs" dictionary in each template. So, to enable the obfuscate function for this particular payload you need to edit Villain/Core/payload_templates/windows/netcat/powershell_reverse_tcp.py and append 'obfuscate' : True to it. image

The reason it is disabled by default in certain payload templates is that, the obfuscate class does not work perfectly with non-hoaxshell payloads and I didn't have the time to adjust it yet, but you can experiment with it if you like.