All Projects → hackernese → SneakyEXE

hackernese / SneakyEXE

Licence: MIT license
Embedding a "UAC-Bypassing" function into your custom payload

Programming Languages

python
139335 projects - #7 most used programming language
c
50402 projects - #5 most used programming language
tcl
693 projects
shell
77523 projects

Projects that are alternatives of or similar to SneakyEXE

QuickUACk
🐤 Some of my antiUAC Scripts for Rubbber Ducky 🐤
Stars: ✭ 22 (-76.84%)
Mutual labels:  uac, uac-bypass
Uacme
Defeating Windows User Account Control
Stars: ✭ 3,868 (+3971.58%)
Mutual labels:  uac, uac-bypass
Bypass-Uac
Small utility written in c++ to bypass windows UAC prompt
Stars: ✭ 27 (-71.58%)
Mutual labels:  uac, uac-bypass
dccwUACBypass
PowerShell script to bypass UAC using DCCW
Stars: ✭ 17 (-82.11%)
Mutual labels:  uac, uac-bypass
UUB
UIAccess UAC Bypass using token duplication and keyboard events
Stars: ✭ 22 (-76.84%)
Mutual labels:  uac, uac-bypass
Privilege Escalation
UAC Bypass for windows
Stars: ✭ 33 (-65.26%)
Mutual labels:  uac, uac-bypass
BloodBank
A simple android project for blood management system.
Stars: ✭ 126 (+32.63%)
Mutual labels:  project
new-project-template
A template for web developers.
Stars: ✭ 12 (-87.37%)
Mutual labels:  project
lit-bb-hack-tools
Little Bug Bounty & Hacking Tools⚔️
Stars: ✭ 180 (+89.47%)
Mutual labels:  hacking-tool
ATtiny13-TinyUPS
Uninterruptible Power Supply
Stars: ✭ 92 (-3.16%)
Mutual labels:  project
TokenBreaker
JSON RSA to HMAC and None Algorithm Vulnerability POC
Stars: ✭ 51 (-46.32%)
Mutual labels:  hacking-tool
Ashok
Ashok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+14.74%)
Mutual labels:  hacking-tool
rename-tool
一个基于 .NET Core 2.x 实现的项目重命名工具
Stars: ✭ 16 (-83.16%)
Mutual labels:  project
refluxion
Refluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-73.68%)
Mutual labels:  hacking-tool
KinectUtil
This project solves the problem of mismatching between rgb camera and depth camera of Kinect camera. And we can get higher quality point cloud model than Kinect itself. We solve the problem by first using both DLT and Zhangzhengyou‘s checkerboard to calibrate the camera, and then applying the calibrated parameters to project and re-project from…
Stars: ✭ 28 (-70.53%)
Mutual labels:  project
Example
Metarhia application example for Node.js
Stars: ✭ 147 (+54.74%)
Mutual labels:  project
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-11.58%)
Mutual labels:  hacking-tool
ideas-for-project-names-starting-with-re
No description or website provided.
Stars: ✭ 27 (-71.58%)
Mutual labels:  project
IP-Tracker
Track any ip address with IP-Tracker. IP-Tracker is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracker.
Stars: ✭ 53 (-44.21%)
Mutual labels:  hacking-tool
project-management
A basic CLI for regularly updating your project's status
Stars: ✭ 90 (-5.26%)
Mutual labels:  project

SneakyEXE


  /$$$$$$                                /$$                 /$$$$$$$$ /$$   /$$ /$$$$$$$$
 /$$__  $$                              | $$                | $$_____/| $$  / $$| $$_____/
| $$  \__/ /$$$$$$$   /$$$$$$   /$$$$$$ | $$   /$$ /$$   /$$| $$      |  $$/ $$/| $$      
|  $$$$$$ | $$__  $$ /$$__  $$ |____  $$| $$  /$$/| $$  | $$| $$$$$    \  $$$$/ | $$$$$    
 \____  $$| $$  \ $$| $$$$$$$$  /$$$$$$$| $$$$$$/ | $$  | $$| $$__/     >$$  $$ | $$__/   
 /$$  \ $$| $$  | $$| $$_____/ /$$__  $$| $$_  $$ | $$  | $$| $$       /$$/\  $$| $$      
|  $$$$$$/| $$  | $$|  $$$$$$$|  $$$$$$$| $$ \  $$|  $$$$$$$| $$$$$$$$| $$  \ $$| $$$$$$$$
 \______/ |__/  |__/ \_______/ \_______/|__/  \__/ \____  $$|________/|__/  |__/|________/
                                                   /$$  | $$                              
                                                  |  $$$$$$/                              
                                                   \______/   

A tool which helps you embedding a UAC-Bypassing function into your custom Win32 payloads ( x86_64 architecture specifically )

  • Tested on Windows 7,8,10 ( 64bit)
  • Free and Open-sourced with full source codes published
  • If it's not working anymore, please notify me

Requirements:


Linux Windows
Architecture Optional x86_64
Python 3.x > YES NO
Module termcolor NO
Distros Any Windows
Version Any Windows 7,8,10

Usage:


[ Linux ]:

This tool does require a python module called termcolor. When you run the script it will automatically install it if you haven't, but if you want the tool to function faster, i would suggest you doing it manually before proceeding

$ pip3 install termcolor #installing termcolor
$ #Temporary usage only, installation below
$ git clone https://github.com/Zenix-Blurryface/SneakyEXE.git
$ cd SneakyEXE/Linux
$ chmod +x sneakyexe.py
$ ./sneakyexe <option>=<path to payload/code> out=<where you wanna save>

[ Windows ]:

  • visit https://github.com/Zenix-Blurryface/SneakyEXE
  • Download the repository, "clone or download" -> "Download ZIP"
  • Unzip it into your optional directory
  • Change dir to \SneakyEXE\Win32\
  • Execute sneakyexe.exe ( or sys\sneakyexe.exe for an improved startup speed )
  • ( Optional : you can copy sneakyexe.exe to whatever directory you want and delete the unzipped one )
- NOTE -
The payload can only be successfully executed by the user with Administrator privilege. Users with limited token wouldn't succeed.

Installation:


[ Linux ]:

$ git clone https://github.com/Zenix-Blurryface/SneakyEXE.git
$ cd SneakyEXE
$ chmod +x install.sh
$ sudo ./install.sh

[ Windows ]:

  • UNAVAILABLE
  • ( Soon will if many people demand )

Build:


  • Built on Opensuse Leap 15.0
  • Developed using Python 3.6.5
  • Developed with gcc (MinGW.org GCC-8.2.0-3) 8.2.0 for the payload compilation
[ Payload Embedding ]
  • In order to build the elevator from source, you will need gcc gcc 8.2.0 ( c11 ) and a AMD64 machine with Windows 10(7/8) 64-bit installed.
# Windows 10/7/8 (AMD64)
# Open cmd.exe / powershell.exe
>> gcc -mwindows -o <output>.exe /source/main.c
[ GUI Version ]
  • In order to build the GUI version from source, you will need Python 3.5.6 ( or higher ) with modules like Pyinstaller, Pillow and a AMD64 machine with Windows 7 64-bit installed.
# Assume we already had  Python preinstalled
# Open cmd.exe / powershell.exe
>> pip install pillow      # Installing Pillow
>> pip install pyinstaller # Installing Pyinstaller
>> mkdir compile           # Optional directory name
>> cd compile
>> pyinstaller --windowed --onefile --icon=Icon.ico /source/Win32/GUI.py # For sysematic version ( /sys ), remove --onefile
>> cd dist
>> GUI.exe                 # The compiled executable :}

Disclaimer:


  • This tool was made for academic purposes or ethical cases only. I ain't taking any resposibility upon your actions if you abuse this tool for any black-hat acitivity
  • Feel free to use this project in your software, just don't reclaim the ownerhsip.

Release:


  • v0.9 beta

Credits:


This tool does embed UACme which was originally coded by hfiref0x but the rest was pretty much all coded by me ( Zenix Blurryface )

Author:


Copyright © 2019 by Zenix Blurryface

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].