t3l3machus / Villain

Villain is a high level stage 0/1 C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
Other
3.72k stars 598 forks source link

Add Ngrok with Villain #94

Closed Lucstay11 closed 1 year ago

Lucstay11 commented 1 year ago

Can you add ngrok directly to the program the same way you did for hoaxshell? And also a default payload function so we can just run the script and it generates the recorded payload. Your program is amazing otherwise!

ck159king commented 1 year ago

It's easy to store payload , why don't you code it Not hard tho

Lucstay11 commented 1 year ago

I did not wait for your response to do so. I coded a bash script that retrieves your python script data (localhost port and ip) and ftp the generated offended malicious code to a remote server. Now I just plug my bad USB into any internet connected computer and it will run powershell to remote download the code and start the reverse shell. Everything is automated.

However your reverse shell is unstable and loses the connection as soon as I enter a too heavy cmd command on the victim. I prefer a persistent shell to the msf venom do you know how to improve this?