t3l3machus / Villain

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
Other
3.75k stars 605 forks source link

[Feature request] incorporate payload to steganography #125

Closed Takaeda4413 closed 2 months ago

Takaeda4413 commented 1 year ago

Hi, I am trying to incorporate the made powershell script into an image so that it can become a steganography image wherein an unwanted user opens the image and the script automatically executes itself. Although im having problems when incorporating the script. Any tips on how to accomplish this? Thanks!

t3l3machus commented 2 months ago

Hi @Takaeda4413, really sorry for the delay.

That's a complex task, and I'm short on time, so I can't elaborate right now. Something different but not far from what you're trying to achieve that might come in handy -> https://medium.com/@sam.rothlisberger/embed-a-malicious-executable-in-a-normal-pdf-or-exe-81ee5339707e