t3l3machus / Villain

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
Other
3.77k stars 611 forks source link

Add option to enable reuse of the payload #4

Closed Cvetaca closed 1 year ago

Cvetaca commented 1 year ago

Hello.

I really like how you have upgraded the hoaxshell program. It is just great. I was experimenting with USB Rubber Ducky on a previous program (hoaxshell) and it worked perfectly (persistant backdoor). But now that payload cannot be reused this approach is useless because you would have to reprogram the USB for every exploited machine :/. Will it be possible to add function to reuse the generated payload?

Thank you!

t3l3machus commented 1 year ago

Hmm you are right, not cool. Alright, I'll take a note for this, maybe I can add an option soon.

damianero95 commented 1 year ago

this is great suggestion

siddharthjain25 commented 1 year ago

Yeah thats the same problem i am facing :( you should make it reuseable :)

ayushis2ayush commented 1 year ago

Hmm you are right, not cool. Alright, I'll take a note for this, maybe I can add an option soon.

Okeh and can you add feature of port forwarding using cloudflare or ngrok etc. and the manipulation of code was amazing,,,,,,

alekitopi commented 1 year ago

Okeh and can you add feature of port forwarding using cloudflare or ngrok etc. and the manipulation of code was amazing,,,,,,

This would not have to be with Villian directly, you can use a screen for example to have the port forwarding process in the background and be able to access it whenever you want.

t3l3machus commented 1 year ago

@Cvetaca With the latest update, you can now use netcat-listener based reverse shell payloads to connect back to Villain which are reusable. So this probably solves the issue.