Closed Cvetaca closed 1 year ago
Hmm you are right, not cool. Alright, I'll take a note for this, maybe I can add an option soon.
this is great suggestion
Yeah thats the same problem i am facing :( you should make it reuseable :)
Hmm you are right, not cool. Alright, I'll take a note for this, maybe I can add an option soon.
Okeh and can you add feature of port forwarding using cloudflare or ngrok etc. and the manipulation of code was amazing,,,,,,
Okeh and can you add feature of port forwarding using cloudflare or ngrok etc. and the manipulation of code was amazing,,,,,,
This would not have to be with Villian directly, you can use a screen
for example to have the port forwarding process in the background and be able to access it whenever you want.
@Cvetaca With the latest update, you can now use netcat-listener based reverse shell payloads to connect back to Villain which are reusable. So this probably solves the issue.
Hello.
I really like how you have upgraded the hoaxshell program. It is just great. I was experimenting with USB Rubber Ducky on a previous program (hoaxshell) and it worked perfectly (persistant backdoor). But now that payload cannot be reused this approach is useless because you would have to reprogram the USB for every exploited machine :/. Will it be possible to add function to reuse the generated payload?
Thank you!