Description
Hello,
i love your tool, but sometimes when i enter a DNS as reverse host,
i get the following error. When i try to execute it on a Windows machine, the message "Poweshell stopped working" pop's up.
Enter the IPAddress or DNS name for the reverse host: hostname.ddns.net
set:powershell> Enter the port for the reverse [443]:442
[] Prepping the payload for delivery and injecting alphanumeric shellcode...
[] Generating x86-based powershell injection code...
[] Reverse_HTTPS takes a few seconds to calculate..One moment..
No encoder or badchars specified, outputting raw payload
Payload size: 353 bytes
Final size of c file: 1508 bytes
[!] Something went wrong, printing error: invalid literal for int() with base 10: 'hostname'
[] Finished generating powershell injection bypass.
[] Encoded to bypass execution restriction policy...
[] If you want the powershell commands and attack, they are exported to
/root/.set/reports/powershell/
With a normal IP everything works fine.
I'm looking forward to a fix and sorry for my bad english!