A tool which helps you embedding UAC-Bypassing function into your custom Win32 payloads ( x86_64 architecture specifically ) Tested on Windows 7,8,10 ( 64bit) Free and Open-sourced with full source codes published Tutorial Requirements: | Linux | Windows —|—|— Architecture | Optional | x86_64 Python 3.x > | YES | NO Module | termcolor | NO Distros | Any | Windows Version | Any | Windows 7,8,10 Usage: [ Linux ]: This tool does require a python module called termcolor . When you run the script it will automatically install it if you haven’t, but if you want the tool to function faster, i would suggest you doing it manually before proceeding $ pip3 install termcolor #installing termcolor $ #Temporary usage only, installation below $ git clone https://github.com/Zenix-Blurryface/SneakyEXE.git $ cd SneakyEXE/Linux $ chmod +x sneakyexe.py $ ./sneakyexe = out= visit https://github.com/Zenix-Blurryface/SneakyEXE Download the repository, “clone or download” -> “Download ZIP” Unzip it into your optional directory Change dir to SneakyEXEWin32 Execute sneakyexe.exe ( or syssneakyexe.exe for an improved startup speed ) ( Optional : you can copy sneakyexe.exe to whatever directory you want and delete the unzipped one ) NOTE – The payload can only be successfully executed by the user with Administrator privilege. Users with limited token wouldn’t succeed. Installation: $ git clone https://github.com/Zenix-Blurryface/SneakyEXE.git $ cd SneakyEXE $ chmod +x install.sh $ sudo ./install.sh UNAVAILABLE ( Soon will if many people demand ) Build: Built on Opensuse Leap 15.0 Developed using Python 3.6.5 Developed with gcc (MinGW.org GCC-8.2.0-3) 8.2.0 for the payload compilation [ Payload Embedding ] In order to build the elevator from source, you will need gcc gcc 8.2.0 ( c11 ) and a AMD64 machine with Windows 10(7/8) 64-bit installed. Windows 10/7/8 (AMD64) Open cmd.exe / powershell.exe gcc -mwindows -o .exe /source/main.c [ GUI Version ] In order to build the GUI version from source, you will need Python 3.5.6 ( or higher ) with modules like Pyinstaller , Pillow and a AMD64 machine with Windows 10 (7/8) 64-bit installed. Assume we already had Python preinstalled Open cmd.exe / powershell.exe pip install pillow # Installing Pillow pip install pyinstaller # Installing Pyinstaller mkdir compile # Optional directory name cd compile pyinstaller –windowed –onefile –icon=Icon.ico /source/Win32/GUI.py # For sysematic version ( /sys ), remove –onefile cd dist GUI.exe # The compiled executable :} Disclaimer: This tool was made for academic purposes or ethical cases only. I ain’t taking any resposibility upon your actions if you abuse this tool for any black-hat acitivity Feel free to use this project in your software, just don’t reclaim the ownerhsip . Release: v0.9 beta Credits: This tool does embed UACme which was originally coded by hfiref0x but the rest was pretty much all coded by me ( Zenix Blurryface ) hfiref0x –> https://github.com/hfiref0x Author: Copyright © 2019 by Zenix Blurryface Download SneakyEXE
https://govanguard.io/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard https://govanguard.io/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-07-07 18:23:002019-07-07 18:23:00SneakyEXE - Embedding "UAC-Bypassing" Function Into Your Custom Payload
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com