t3l3machus / hoaxshell

A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Crashes when changing directory

pr0b3r7 opened this issue · comments

Hi - good job on the FUD on win defender
I'm having an issue where I'm not able to cd to any dir
image
The same issue occurs when opening calc.exe -
image
Stack trace shows
hoaxshell > calc.exe----------------------------------------Exception occurred during processing of request from ('100.77.140.74', 50237)Traceback (most recent call last): File "/usr/lib/python3.10/socketserver.py", line 316, in _handle_request_noblock self.process_request(request, client_address) File "/usr/lib/python3.10/socketserver.py", line 347, in process_request self.finish_request(request, client_address) File "/usr/lib/python3.10/socketserver.py", line 360, in finish_request self.RequestHandlerClass(request, client_address, self) File "/usr/lib/python3.10/socketserver.py", line 747, in init self.handle() File "/usr/lib/python3.10/http/server.py", line 425, in handle self.handle_one_request() File "/usr/lib/python3.10/http/server.py", line 413, in handle_one_request method() File "/opt/hoaxshell/hoaxshell.py", line 306, in do_POST to_b_numbers = [ int(n) for n in bin_output ] File "/opt/hoaxshell/hoaxshell.py", line 306, in to_b_numbers = [ int(n) for n in bin_output ]ValueError: invalid literal for int() with base 10: ''
doesn't seem to me it is the syntax either -
image

This issue was fixed thanks to this PR #2 - pending approval from @t3l3machus to merge to main

Hi, PR merged. It's weird that this issue came up, i thought i dealt with it at an earlier stage of development. Anyway, @brightio quick-fixed it. Thanks guys

Been there done that 🤣