t3l3machus / Villain

Villain is a high level stage 0/1 C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
Other
3.73k stars 602 forks source link

payload session ID issue #29

Closed salnaggar closed 1 year ago

salnaggar commented 1 year ago

every time i run

generate os=windows lhost=eth0

it create payload with unique session ID and it will work only on one target, i can't execute same payload on 2 targets i have to create payload for each target separately!!

how to allow same payload to be executed on multiple targets at the same time??

Thank you

salnaggar commented 1 year ago

the payloads are disposables lol i can use them one time and i have to create payload for each target... i hope you fix that thing

t3l3machus commented 1 year ago

This is not an issue, it was designed this way. If the Villain server accepts any session ID not necessarily generated by it then someone can use the payload to plant sessions in a Villain instance. But since many people have requested for an option to make session ids reusable, i will implement it in a future update. This also clearly mentioned in the README: image

salnaggar commented 1 year ago

Thank you :) i'll try to add that myself with some help from my best friend ChatGPT

t3l3machus commented 1 year ago

Actually, in a few days or so I will release a new version that includes netcat listener support. Basically you will be able to grab reverse shells from netcat-listener based payloads as well and those will be reusable. So maybe that solves your issue