Bypass signature-based detection with Villain

Поділитися
Вставка
  • Опубліковано 10 гру 2024

КОМЕНТАРІ • 27

  • @dragonbg6105
    @dragonbg6105 2 роки тому +2

    Totally agree with the last part. Better for the tool and keeps script kiddies away. A win win.

  • @shayarand
    @shayarand 2 роки тому +1

    truly amazing. love every video.

  • @Asparuxredsnow
    @Asparuxredsnow 2 роки тому

    I love every video bro, thanks for the Job.

  • @thomasmarques2816
    @thomasmarques2816 2 роки тому

    Great video again. Amsi is really the easiest thing to bypass xd

  • @tanmoygoswami927
    @tanmoygoswami927 2 роки тому

    truly greate. love your content bro

  • @JuanBotes
    @JuanBotes 2 роки тому

    luv the content thanks for sharing \o/

  • @thuthaophan1834
    @thuthaophan1834 2 роки тому +1

    truly amazing. love every video. Plsease help me, How use to Viliain with Ngrok

    • @HaxorTechTones
      @HaxorTechTones  2 роки тому

      Thanks! Check my channel, i've made a video about it. Also check issue #17 on the project's repository for more info

  • @greyburns6170
    @greyburns6170 6 місяців тому

    You're my Arnold Schwarzenegger bro

  • @franklinfarms4166
    @franklinfarms4166 2 роки тому

    great video thanks for sharing

  • @moviewithmedha
    @moviewithmedha Рік тому

    Is there any way to compile this script without using third-party tools? third-party tool's executable get detected easily. Please suggest me about this issue.

  • @willpape1625
    @willpape1625 Рік тому

    After tweaking code, I had a reboot and now ./Villain.py will not run and I am receiving the following error: Traceback (most recent call last):
    File "/root/Villain/./Villain.py", line 11, in
    from Core.common import *
    File "/root/Villain/Core/common.py", line 12, in
    from Crypto.Cipher import AES
    ModuleNotFoundError: No module named 'Crypto'

  • @cringykid5306
    @cringykid5306 2 роки тому

    ok the desktop image got me

  • @workerholy7684
    @workerholy7684 2 роки тому

    Thank you so much for the tools! One questions for villain, is there any way i can utilize tunneling service such as ngrok?

    • @HaxorTechTones
      @HaxorTechTones  2 роки тому +1

      Thanks! I've made a video about it, you can find it on my channel. Also the closed issue #17 in the project's repo has important information about ngrok usage.

  • @ouedkniss5349
    @ouedkniss5349 2 роки тому

    Make a video about bypassing behavior based detection

  • @mukto2004
    @mukto2004 2 роки тому

    Why you have auto sample submition enabled 😩😭😭

  • @Arjun-eg1lz
    @Arjun-eg1lz 2 роки тому

    Hi Mr.t3l3machus
    i have tested the tool(Villain) the code is executed smoothly ,but unable to get shell and i have tested in multiple win10 machines using obfuscate,encode and constraint_mode . I'll waiting for response.

    • @JoeMamaTheSecond
      @JoeMamaTheSecond Рік тому +1

      Obfuscate it manually. Auto is obviously detected

  • @sandhyadornal1772
    @sandhyadornal1772 2 роки тому

    how to use it over wan

  • @evilglitch6546
    @evilglitch6546 2 роки тому +1

    can you edit the program payload so it make the updated payload by it self, so we not need to edit it ourself i mean great video and thanks for the help but it would be better if you edit the program to make the new payload by itself please

  • @greyburns6170
    @greyburns6170 6 місяців тому

    But is anyone else starting to feel like cyber security has pretty much won by now? Idk I guess rly bad actors doing physical penetration attacks is still happening. But the days of hacking your friends laptop to Rick roll him are pretty much dead. Thanks behavior based protection. I'm drunk

  • @zedfalcon6972
    @zedfalcon6972 2 роки тому

    ew

  • @Boolap1337
    @Boolap1337 2 роки тому

    Im new into this so my question might sound dumb..
    Lets say you establish a session with Villain, how do you escalate the priviliges with Villain, if needed? Is there someway I can transfer over files like I usually do with "python -m http.server" ?
    Is that what wwwtree is for?

    • @HaxorTechTones
      @HaxorTechTones  2 роки тому

      Unfortunately a Villain backdoor is not a fully functional pty. This means that during privilege escalation you're gonna have a bad time, you need to find the PE vector and catch a new shell as the elevated user. Yes, wwwtree is a tool to use instead of the python http server module (actually it is utilizing the http.server module). You can transfer files normally using curl or any other web client.

    • @Boolap1337
      @Boolap1337 2 роки тому

      @@HaxorTechTones Thanks, appreciate the answer. Learning new things everyday from you nowadays.. :)