xp4xbox / Python-Backdoor

This project is a cross-platform backdoor/reverse shell and post-exploitation tool written in Python3
GNU General Public License v3.0
707 stars 204 forks source link

I am facing this issue :( #79

Closed victorvondoom25 closed 2 years ago

victorvondoom25 commented 2 years ago

ValueError: Fernet key must be 32 url-safe base64-encoded bytes

xp4xbox commented 2 years ago

When do you get this error.

victorvondoom25 commented 2 years ago

When do you get this error.

when i was using a tcp address :(

victorvondoom25 commented 2 years ago

When do you get this error.

bhuh when i an running it on localhost network it is fine but on WAN it is showing this :(

xp4xbox commented 2 years ago

when does the error appear though when running the program.

victorvondoom25 commented 2 years ago

when does the error appear though when running the program.

its problem with client :(

xp4xbox commented 2 years ago

when though, like when you open the program, when you connect, i need more details.

victorvondoom25 commented 2 years ago

when though, like when you open the program, when you connect, i need more details.

can i get you telegram or instagram so i can send you images :(

xp4xbox commented 2 years ago

you can drag and drop images through github coments

victorvondoom25 commented 2 years ago

Screenshot 2021-12-28 221634 <this is the error while running client :(

xp4xbox commented 2 years ago

The latest commit should fix it

victorvondoom25 commented 2 years ago

The latest commit should fix it

No its showing same error :(

victorvondoom25 commented 2 years ago

Hey one thing if you use port number in four digits like 1234 it works but when you use service like ngrok it's not working because you by default get 5 digit port number.

I though maybe this could help you a bit. :)

victorvondoom25 commented 2 years ago

The latest commit should fix it

Hey

xp4xbox commented 2 years ago

Can you add print(objSocket.recv(intBuff).decode()) on line 110 in the client and tell me the output.

victorvondoom25 commented 2 years ago

Can you add print(objSocket.recv(intBuff).decode()) on line 110 in the client and tell me the output.

Same error : 147588317-36774629-e4f9-41b6-8228-894a79806880 (

xp4xbox commented 2 years ago

Try the latest commit

victorvondoom25 commented 2 years ago

Try the latest commit

nah bruh that is again showing the same error 147687261-53783aa6-c590-441e-aeb0-4969cf10a70b

victorvondoom25 commented 2 years ago

Try the latest commit

hey

xp4xbox commented 2 years ago

Try the latest commit, I did a big refactor + improvement