Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team.
The main idea behind the payloads generated by this tool is inherited from HoaxShell. One could say that Villain is an evolved, steroid-induced version of it.
git clone https://github.com/t3l3machus/Villain
cd ./Villain
pip3 install -r requirements.txt
You should run as root:
Villain.py [-h] [-p PORT] [-x HOAX_PORT] [-c CERTFILE] [-k KEYFILE] [-u] [-q]
For more information about using Villain check out the Usage Guide.
A few notes about the http(s) beacon-like reverse shell approach:
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything…
Avilla Forensics is located in first place in the award international Forensics 4:Cast, in the…
Comprehensive guide to leveraging Google Chrome's extensions for Open-Source Intelligence (OSINT) tasks. In this article,…
Embark on a journey into the realm of digital forensics with our exploration of 'Analisi-Digital-Forense.…
The intersection of intelligence, investigation, and mobility. In this comprehensive guide, we delve into the…
Tookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is…