t3l3machus / Villain

Villain is a high level stage 0/1 C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
Other
3.72k stars 598 forks source link

issue with payload #81

Closed InspiritW closed 1 year ago

InspiritW commented 1 year ago

Villain > ---------------------------------------- Exception occurred during processing of request from ('10.10.187.15', 36078) Traceback (most recent call last): File "/usr/lib/python3.11/socketserver.py", line 317, in _handle_request_noblock self.process_request(request, client_address) File "/usr/lib/python3.11/socketserver.py", line 348, in process_request self.finish_request(request, client_address) File "/usr/lib/python3.11/socketserver.py", line 361, in finish_request self.RequestHandlerClass(request, client_address, self) File "/usr/lib/python3.11/socketserver.py", line 755, in init self.handle() File "/usr/lib/python3.11/http/server.py", line 432, in handle self.handle_one_request() File "/usr/lib/python3.11/http/server.py", line 420, in handle_one_request method() File "/root/Villain/Core/villain_core.py", line 953, in do_GET Sessions_manager.active_sessions[session_id]['Username'] = url_split[2]


IndexError: list index out of range
???
t3l3machus commented 1 year ago

@InspiritW This has been fixed, thanks.