Closed AdMediastic closed 1 year ago
@AdMediastic
Functions like "obfuscate" and "encode" are enabled for each payload from the "attrs" dictionary in each template. So, to enable the obfuscate function for this particular payload you need to edit Villain/Core/payload_templates/windows/netcat/powershell_reverse_tcp.py
and append 'obfuscate' : True
to it.
The reason it is disabled by default in certain payload templates is that, the obfuscate class does not work perfectly with non-hoaxshell payloads and I didn't have the time to adjust it yet, but you can experiment with it if you like.
This is the error I am getting!![image](https://github.com/t3l3machus/Villain/assets/121597815/203ee41d-e8c5-4931-8705-b79906550094)