Villain-Unleashed new features demo 2023

preview_player
Показать описание
Help the project grow with a Star or by following me on Github:

⚡️ Please subscribe and connect:

💚 Respect on HackTheBox:

00:00 - Intro
00:25 - Payload generator changes
03:21 - Pseudo shell prompt improvements
04:19 - File uploads
05:40 - Invoke-ConPtyShell
12:40 - Exec command
08:13 - Chat feature
09:35 - HoaxShell new payloads
Рекомендации по теме
Комментарии
Автор

You're always making incredible projects, love what you do !

dayCTF
Автор

Thank you, my friend, that you are not brilliant, but you talk and think that most of those who watch you are professionals. I hope you will take into account that we are new to this field.

snowden-IT
Автор

A new subscriber for this dude here from Morocco

elmehdioubouhouch
Автор

You are amazing man i love the project keep it up

elmehdioubouhouch
Автор

Thx for your project . It is very fantastic

igornemorssa
Автор

how do i put hoaxshell payloads into : . ps1 file and just fake to. png or some image file extension, and when they click on it executed and just hide or close the powershell right away

hpmh
Автор

This is so good, and you are one hell of a software developer👍 I hope your employer pays you well my friend!

kirtib
Автор

When I execute the payload on the target machine windows doesn't flag it or stop it, and it's like it worked but when I check back on the attacker computer there's no shell session? Does the victim computer also have to have netcat?

Łynx
Автор

Error parasiong LHOST, Invalid Ip or interface am trying to use ngrok ):

ooxoox
Автор

there's a bug in the coolest shell (the cmd one) but let's leave it like that. these who know a little bit of batch will be able to pinpoint this miniscule issue in a heartbeat and those that don't probably shouldn't be using it anyway. wish it was more stable though because i like the idea. gotta try expanding this one template

lumikarhu
Автор

Is it possibile to do a persistent shell?🙏

IllllIIIIIlIlIlllll
Автор

how can i take a screenshots desktop
from the target machine

alquranalkarim-
Автор

Why does my netcat tcp reverse shell lose connection after a while without doing anything?
I managed to establish the connection and after aprox 5 mins it loses connection, why is it doing that?

andrewlawrence
Автор

Can i run .ps1 script on Kali into Windows Machine with Villain? Cause .ps1 script is detected by Windows Defender on Windows

rizkysays
Автор

Dude, your project is great... But I have some issue with villain...I can't jumped into cmd, I am unable to download file and execute file through this shell.. And some commend doesn't work... can you tell me how to solve it... Please reply 🙏... Thank you

Chinmoy-bfcz
Автор

My villain isn't working 😢
It doesn't get a reverse shell

linkstoamazingstuffs
Автор

Hello! What an incredible project! Tell me is there any way to migrate connection to meterpreter?

DontDont-ri
Автор

I need help. After uploading the payload to the powershell it won't establish the connection, it doesn't show the message:"Backdoor session established on ...".Does it only happen to me? Someone help me pls.

adamouassar
Автор

when i try using it, it doesnt send back any sort of connection or message at all to villain. i send it in powershell and did everything the exact same that you did. Any idea how to fix it?

philxdes
Автор

Hi telemachus I want to know if the payload must be on the same network to function?

danishkute