πŸ‰
Gurpreet06
  • πŸ‘€Introduction
    • ☠️About me
    • ☎️Contact
  • πŸ‘ΎOffsensive Security
    • ⛓️OSEP
    • πŸ‰OSCP
    • ♾️OSWP
  • πŸ—³οΈHack The Box
    • β›ˆοΈCPTS
  • 🐞Zero-Point Security
    • βš”οΈCRTO
    • ⛓️CRTL
  • πŸ§™β€β™€οΈAltered Security
    • πŸ•·οΈCRTP
    • ⛓️CRTE
  • πŸ”΄Extreme Red Team Laboratories
    • πŸ“¬Active Directory Chains - MailService
    • πŸ“¬Active Directory Chains - IFIXTCENTCEN
  • πŸ’§Sektor7
    • πŸ”Red Team Operator
  • πŸ“•eLearnSecurity
    • ⛓️eCPPTv2
    • πŸ““eJPT
  • 🧊Mikrotik
    • πŸ–₯️MTCNA
  • ☒️Antivirus Bypass
    • β›ˆοΈCrowdStrike Falcon
    • β›ˆοΈBit Defender Premium Antivirus
    • β›ˆοΈSophos Intercept X Antivirus
    • β›ˆοΈSophos Home Premium Antivirus
    • β›ˆοΈKaspersky Plus Protection
    • β›ˆοΈHarmony Checkpoint Security
    • β›ˆοΈWatchGuard Advanced EPDR
    • β›ˆοΈTrend Micro Maximum Security
    • β›ˆοΈESET Security Premium Antivirus
    • β›ˆοΈMalwarebytes Premium Antivirus
    • β›ˆοΈNorton 360
    • β›ˆοΈAVIRA Prime Antivirus
    • β›ˆοΈMcAfee Total Protection
    • β›ˆοΈQuick Heal Total Protection
  • πŸ‘¨β€πŸ’»PROJECTS
    • πŸ•΅οΈInfoSniper (Bypassing Antivirus)
    • 🦈PowerSSH
    • πŸ•΅οΈPyExec
    • β˜ƒοΈPyWMI
    • πŸ“­ShareHunter
    • πŸŒ†ShadowDesk
    • πŸ›‚C2Serv
    • ⛷️StealthInjector
    • πŸ¦‚StealthInvoke
    • πŸ—οΈAMSI Patcher (Bypassing Antivirus)
    • πŸ§–β€β™‚οΈRDP-Stealer
    • πŸ“ΈTakeScreenShot
    • πŸ”‘SharpKeyLogger
    • πŸ‘ΏHellCat (EDR-Escaper)
    • 🎫ETW Patcher (Bypassing Antivirus)
    • πŸ€–PRPT (Bypassing Antivirus)
    • 🌐What Internet Knows About You (OSINT)
    • πŸ”PowerShell SSL Reverse Shell
    • πŸ“ΆWiFi - Crack
    • ⚠️ICMP Data Exfiltration
Powered by GitBook
On this page
  • 1.1. What is Impacket-PsExec?
  • 1.2. How does Impacket-PsExec work?
  • 1.3. Limitations of Impacket-PsExec
  • 1.4. Differences between PyExec and Impacket-PsExec
  • Features
  • Note
  1. PROJECTS

PyExec

Enhanced version of Impacket-PsExec

PyExec is a tool similar to Impacket-PsExec, but with a distinct functionality: instead of uploading a malicious binary, it allows the execution of any binary file that is available on both the local and remote systems.

1.1. What is Impacket-PsExec?

Impacket-PsExec is a tool from the Impacket suite that allows remote command execution or binary loading on Windows systems. PsExec replicates the functionality of the Sysinternals PsExec tool, which is widely used for the remote administration of Windows systems.

1.2. How does Impacket-PsExec work?

  1. SMB Connection: Uses the SMB (Server Message Block) protocol to connect to the remote system.

  2. Binary Upload: Uploads a malicious binary (typically psexecsvc.exe) to the remote system in a temporary folder.

  3. Binary Execution: This binary is executed with administrative permissions to enable the requested command execution.

  4. Binary Deletion: Once executed, the binary is deleted to reduce traces, although it may still be detected by security solutions.

1.3. Limitations of Impacket-PsExec

  • Detection: Uploading a malicious binary makes it more susceptible to detection by antivirus or EDR (Endpoint Detection and Response) solutions.

1.4. Differences between PyExec and Impacket-PsExec

  1. No Binary Upload: PyExec does not upload binaries to the remote system, significantly reducing the likelihood of detection by security solutions.

  2. Flexibility: PyExec allows the execution of binaries that already exist on the remote system or even local commands, while Impacket-PsExec depends on the psexecsvc.exe binary.

  3. Specific Use: PyExec is designed to be stealthier in highly monitored environments, such as in advanced penetration testing or Red Team scenarios.

Features

  • Remote Command Execution

  • No Binary Uploads

  • Executes Local and Remote Binaries

  • Stealthy Design for Advanced Penetration Testing

Note

This binary has been tested against:

  • CrowdStrike

  • BitDefender

  • Sophos

  • Trend Micro

  • Avast, and other antivirus solutions

Successfully bypassing them all.

PreviousPowerSSHNextPyWMI

Last updated 6 months ago

πŸ‘¨β€πŸ’»
πŸ•΅οΈ