whatotter / pwnhyve

a pi-zero powered hacking tool, with badusb capabilities and hoaxshell payload generation and injection; the little sibling of the unfortunately dead p4wnp1-aloa
MIT License
247 stars 17 forks source link

issue #35

Closed someguy1412 closed 3 months ago

someguy1412 commented 3 months ago

any usage for this? this is unclear to me

someguy1412 commented 3 months ago

it runs fine now but i see zero modules image

chufo4 commented 3 months ago

this is my alt and it has modules but they dont work i guessed all the controls are arrows keys and 1, 2 & 3 does nothing i also tried running main.py that also didnt work image Exception in thread Thread-1 (display_frame): Traceback (most recent call last): File "C:\Program Files\WindowsApps\PythonSoftwareFoundation.Python.3.12_3.12.752.0_x64qbz5n2kfra8p0\Lib\threading.py", line 1073, in _bootstrap_inner self.run() File "C:\Program Files\WindowsApps\PythonSoftwareFoundation.Python.3.12_3.12.752.0_x64qbz5n2kfra8p0\Lib\threading.py", line 1010, in run self._target(*self._args, **self._kwargs) File "C:\Users\admin\Desktop\pwnhyve\pwnhyve-main\vnc\stream.py", line 332, in display_frame if s.recv(16) == b"\x01": ^^^^^^^^^^ on win 11 and tried on kali linux too

whatotter commented 3 months ago

sorry, the vnc module is still in heavy development atm so it might be very buggy

the controls are (iirc) the arrow keys as the joystick, 1,2,3 as the right side keys, and the forward slash key as joystick down

you could also click on the buttons with your mouse on the ui as if your using the real display

I'll switch the module to websockets eventually, so there won't be anymore socket issues

someguy1412 commented 3 months ago

oh thanks, yeah i cant buy any oleds because none are in my region, so i said maybe i could use python for the vnc and get the display but yeah its heavily buggy sadly