Learn how to convert your Python code to run as an EXE on Windows 11. The code will run on Windows without Python installed. So, you think you need Python installed to run Python code on Windows 11? Well, think again. You also think that Windows 11 real time protection will protect you against malicious code? Well think again! Warning: Don't download software that you don't trust. Only download software from reputable software developers and those you trust. // MENU // 0:00 ▶ Introduction: Warning 2:03 ▶ Windows 11 setup: Python not installed, Windows version, anti-virus 3:12 ▶ Demo of python code running on Windows 11: 5:42 ▶ Demo of WiFi code 6:47 ▶ Nuitka installation steps 10:27 ▶ Compile Python code 13:52 ▶ Run compiled code on Windows 11 14:25 ▶ Be aware of Python requirements that you need to install // SCRIPTS // Python key: davidbombal.wiki/pythonkeys Python WiFi: davidbombal.wiki/pythonwifi // PDF Instructions// Download here: davidbombal.wiki/pythoncompile // SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal UA-cam: ua-cam.com/users/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
You great Sir, I really wanna know how I can access and operate my laptop virtually like you do using your MAC ((disclaimer:: I don't have any hac5 keylogger))
@@jk_tecs I am trying to get the code to work on linux, but is this code just for windows? As I have a Win10 PC, and did you have to remane the .ps to .wpy? This is actually my first day coding python!
Great stuff. I also found that hex encoding the python keylogging script first before pasting it into a file circumvents Defender's Real-Time Protection. Then just assign a variable to decode the hex to utf-8 string. Then run exec on the variable. It's simple but runs the malicious python without being caught by Defender.
So if you disable Windows Antivirus, you only stop the Windows intrusiveness on your system. That's why you cannot trust your own "system protection features" . Thanks again, David Bombal, for another great content video. Always learning something new.
@@davidbombal it does but when I'm working with stuff I'm aware is for exploits I don't need AV slowing me down, when I download cracked software from TPB I don't need that headache.
Great video, building compiled python code was almost more interesting than the code itself. I knew it was possible to compile python code but never had time to research the process. That was a great introduction to a whole new functionality for my python code.
Also a very good reason to use a seperate 2 factor auth. Even with signed code from a trusted developer we are all 1 malicious supply chain attack away from being compromised.
Here comes my awaited video. I've really been longing to run my first EXE app and this tutorial will come in handy for that. Thanks, much #MyTechnologyTutor
The age of the electron and switch... I really hope that the skiddies of today adopt the white hat mind frame, content such as yours I believe goes a long way to that end.
david, as you mention before, i check the version instalation of nuitka on powershell but nuitka not found and shown this kind of text ( The term 'nuitka' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. ) how to solve this problem? thankyou for your contribution for community
This is a spectacular video, I do appreciate your great advice, you are teaching us something we don't know, you are right we must be aware of where we put our steps on.
By the Python WiFi File i get this error: UnicodeDecodeError: 'utf-8' codec can't decode byte 0x81 in position 76: invalid start byte. Can someone help me please.
Hey David! I love your content. In my humble opinion you don't need to repeat things so many times like "I'm running W11" or "AGAIN, do not use this for malicious purposes, the code is for educational purposes only, so don't use it for something malicious" I Know man, you said that like 5 times, go on... not sure if this is bodering only me or not but I wanted to tell you that. Thanks for sharing!
Great video, it's amazing that you are also up to date with the topics of your videos, that is why you made windows 11 as it is new and there are not many courses... Just amazing
Hi, very good video! I've a question. I've noticed that the keylogger doesn't log the admin password that is required for installing softwares for example, and that made me feel safe. Now, this is a simple script, so can it be updated to log also these hidden keys or is it not possible? Thanks for answer and i'm sorry for my English that isn't very good 😅
-Great content Professor David Bombal...!!! -People always ask me what is the best language to learn and I always return the question, "Best language for what...?". -C and C++ are the languages where OSs are usually written and even today code for devices such as IOTs is written in C (devices how run without a OS), as is the case with Arduino, and others. besides many backends and made in C or java. -Python is a scripting language and in the 90s when I learned to program I learned Assembly (Low level machine language) and C++ (which is a high level language), but scripting languages at that time when they emerged were called High High Level why they needed an OS running for them to run on top. -The teacher example uses a module that basically downloads the GCC C compiler and compiles it into the stand alone executable using the Python as source. - Interesting solution this module, the new Raspberry Pi, the Nano if I'm not mistaken, can compile not only from C but from a Python variant for micro devices. -Thank you very much for the knowledge...!!!
Thanks for the lesson. Just for educational purposes, can you automate the python keylogger to run on one computer and send the keylogs to another computer. In a way such that you can handle security issues within your network. You can see which specific computer in your network was used to do something. I hope you understand what I'm trying to say
Thank you for this great video. Highly valuable information. Really appreciate your efforts in creating a detailed document on top of the video and sharing it with us! Question: If this code was compiled for Linux distros/mac OS and run on them, would it be any secure than windows?
Thank you. Glad it was helpful Vyas. I would have to create specific code for Linux and macOS to test. This code would not work on either of those platforms.
Wow I like this video, david is there any method download key logger in victim machine but key logger txt store back in attack machine just like a reverse shell reverse back to attack machine?
The worst about that type of code is that extremely many commercial programs, do use keylogger-code to trigger events and so on, so it is not straight forward to detect a keylogger and then trigger. Even windows itself is using keyloggers to functioning. You do almost have to detect intend of the program:-)
David sir.. A question: What if someone develop the same code for a linux distro like the .Deb or .rpm and if I try to execute it, will my distro stop it ? What's your views on it ? Btw Much ❤️ David sir.
Not saying that it's hard to evade Windows Defender, but why should it flag it in the first place if your scripts aren't sending the data outside? it's a local keylogger and a local wifi passwords revealer.
few modules that come with python the antivirus will detect as malware, that includes shutil, ctypes, sys, os, glob...of course is just happen when you convert it to .exe and as single file....David, do you use Pyinstaller?
Good video. I have a different question. I created exe file using PyInstaller, it works fine in that computer. If I move that file to other computer regardless of windows or Mac, the exe file is considered as security thread. What I can do to resolve this issue.
Excellent presentation as usual. Thanks for the warning also. Could you please help me with this issue on windows "Your device is missing important security and quality fixes." ? I have tried all the means out there but couldn't get rid off it.
I have a question : If any software started it should have access to our keyboard for input and it should also able to store that for further use , but is it possible to send that information to someone else's pc without caught by antivirus ? SORRY FOR BAD ENGLISH 😅
It's also easy (using a tool) to append your malicious executable to an other legit one . So you may think you're launching a real/known program that is working exactly as expected but ... will also execute a malicious code that no one will ever suspect 😱
I cannot get the version of nuitka it shows this: nuitka : The term 'nuitka' is not recognized as the name of a cmdlet, function, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again. At line:1 char:1 + nuitka --version + ~~~~~~ + CategoryInfo : ObjectNotFound: (nuitka:String) [], CommandNotFoundException + FullyQualifiedErrorId : CommandNotFoundException
I'm really enjoying this video but I'm stuck at installing Nuitka. I'm on Windows 10 if that makes a difference. I am getting this error: "The installer has insufficient privileges to access this directory: C:\Program Files\WindowsApps\...\Scripts. The installation cannot continue. Log on as administrator or contact your system administrator." Run as administrator isn't available. I also tried executing this from an elevated command prompt and received the same error. Can you help? Thanks in advance.
Its not necessarily a malware what did you just code... Because the output is stored locally to your computer, otherwise all of our coded programs would get deleted😅. Try exfiltrating the output from the same binary. For instance create a reverse shell or send it via post request to a server. It might pass in case of post request but thats an issue to demonstrate !!
I did the same test (compiled python code) but it was a (lets encrypt) certificate updating program (as an extension to a monitor software) and windows defender suddenly deleted(!) my program. I had to white list is to keep it usable.
i have this error on wifi script: command_output = subprocess.run(["netsh", "wlan", "show", "profiles"], capture_output = True).stdout.decode() UnicodeDecodeError: 'utf-8' codec can't decode byte 0xa1 in position 45: invalid start byte
i'm trying to pack my py script into exe to run on another pc using pyinstaller, cx-freeze but no luck, should i try this or do you have some right way to pack the code to exe? Thank you! ps: i used nuitka and its ok now
The problem is that if everything is made completely idiot proof, same time you make it very inefficient. Like the ability to get global keyevents is a useful feature for power tools that work when you give a key shortcut.
it is funny because I made a script in python for task automation at work, I d like my colleagues to be able to use it however the .exe generated with nuitka keeps getting flagged as a Virus... No way for them to use it
Learn how to convert your Python code to run as an EXE on Windows 11. The code will run on Windows without Python installed.
So, you think you need Python installed to run Python code on Windows 11? Well, think again. You also think that Windows 11 real time protection will protect you against malicious code? Well think again!
Warning: Don't download software that you don't trust. Only download software from reputable software developers and those you trust.
// MENU //
0:00 ▶ Introduction: Warning
2:03 ▶ Windows 11 setup: Python not installed, Windows version, anti-virus
3:12 ▶ Demo of python code running on Windows 11:
5:42 ▶ Demo of WiFi code
6:47 ▶ Nuitka installation steps
10:27 ▶ Compile Python code
13:52 ▶ Run compiled code on Windows 11
14:25 ▶ Be aware of Python requirements that you need to install
// SCRIPTS //
Python key: davidbombal.wiki/pythonkeys
Python WiFi: davidbombal.wiki/pythonwifi
// PDF Instructions//
Download here: davidbombal.wiki/pythoncompile
// SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
UA-cam: ua-cam.com/users/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Thank you David for this big eye-opener! Stay safe and keep up the great work.
You great Sir,
I really wanna know how I can access and operate my laptop virtually like you do using your MAC ((disclaimer:: I don't have any hac5 keylogger))
I'm using VNC. I demonstrate how in videos on my channel like this: ua-cam.com/video/mIdF7K3Nmlw/v-deo.html
Thanks, Much
Just watched it and got what I wanted. Never knew it was so simple!!
@@jk_tecs I am trying to get the code to work on linux, but is this code just for windows? As I have a Win10 PC, and did you have to remane the .ps to .wpy? This is actually my first day coding python!
Great stuff. I also found that hex encoding the python keylogging script first before pasting it into a file circumvents Defender's Real-Time Protection. Then just assign a variable to decode the hex to utf-8 string. Then run exec on the variable. It's simple but runs the malicious python without being caught by Defender.
care to elaborate? can pm
I have some doubts can u help me..?
EVERYONE follows "this is only for educational purpose" 🤣🤣
Yes. Do not get into trouble!
My dignity and my faith in you does not allow me to do malicous works
So if you disable Windows Antivirus, you only stop the Windows intrusiveness on your system.
That's why you cannot trust your own "system protection features" .
Thanks again, David Bombal, for another great content video.
Always learning something new.
THIS
Windows Real Time protection stops a lot of nonsense. I wouldn't recommend turning that off.
@@davidbombal it does but when I'm working with stuff I'm aware is for exploits I don't need AV slowing me down, when I download cracked software from TPB I don't need that headache.
Great video, building compiled python code was almost more interesting than the code itself. I knew it was possible to compile python code but never had time to research the process. That was a great introduction to a whole new functionality for my python code.
This is amazing and dangerous at the same time. Thank you so much sir.
Thank you!
Many thanks David for the very informative episode, it is always appreciated.
And G'day from Australia mate :)
David this video was quality and I enjoy this type of series you’ve been doing the last few months!!
Back at it again yayyyy! Thanks
Hope you enjoyed the video Vlad
Also a very good reason to use a seperate 2 factor auth.
Even with signed code from a trusted developer we are all 1 malicious supply chain attack away from being compromised.
Very informative and great content David! I appreciate it!
Glad you enjoyed it!
Thank you David, I am going to test it in my virtual environment and inform the family and friends.
Here comes my awaited video. I've really been longing to run my first EXE app and this tutorial will come in handy for that. Thanks, much #MyTechnologyTutor
You're welcome!
The age of the electron and switch... I really hope that the skiddies of today adopt the white hat mind frame, content such as yours I believe goes a long way to that end.
Thank you. I hope people will learn to protect companies - as we need that.
SKS, OCS, ROM
thank you sir. I was making project on Keyogger and this and your old video helped me a lot.
Glad it helped!
Congrats on making it to 800K :) Trying to follow in your footsteps 😀
Was waiting for this video...
finally😌🥳
Hope you enjoy the video!
Outstanding. Want more stuff like this
david you are the best i had this compiling problem i couldnt compile my python file (i created a face detector) thank you for the amazing video
Glad it helped!
Thank you man i really appreciate you did a thing that most people didnt! thx bro i needed this for longg
Glad you found the video useful!
Its a great video !!! Thanks for spending your precious time making this video for us. There's a question actually, is this similar to pyinstaller ?
Thank you. I found that Windows removes software created with pyinstaller. So, I found that Nuitka is much better in my tests.
@@davidbombal much appreciate 🙏🏻
Really love your work keep it up sir 😉, ignore the haters and keep going.
Thank you so much 😀
Aah I needed this a lot for some scripts! Thank you good sir!
david, as you mention before, i check the version instalation of nuitka on powershell but nuitka not found and shown this kind of text ( The term 'nuitka' is not recognized as the name of a cmdlet, function, script file, or operable program.
Check the spelling of the name, or if a path was included, verify that the path is correct and try again. )
how to solve this problem? thankyou for your contribution for community
i did same all step by step and still got that error that Nuitka not found.... dang.
This is amazing ,wonderful and dangerous at the same time 😳.
That was awesome, thanks David.
This is a spectacular video, I do appreciate your great advice, you are teaching us something we don't know, you are right we must be aware of where we put our steps on.
Glad it was helpful!
Nothing to say. Great as always
Thank you so much 😀
By the Python WiFi File i get this error: UnicodeDecodeError: 'utf-8' codec can't decode byte 0x81 in position 76: invalid start byte. Can someone help me please.
Hey David! I love your content. In my humble opinion you don't need to repeat things so many times like "I'm running W11" or "AGAIN, do not use this for malicious purposes, the code is for educational purposes only, so don't use it for something malicious" I Know man, you said that like 5 times, go on... not sure if this is bodering only me or not but I wanted to tell you that. Thanks for sharing!
Repition is important, because some people are hard of hearing...by choice. Hence, repeat...repeat...repeat.
hey why is FUD on windows 11 but not windows 10? what did they change about windows defender?
نتمنى لك مزيد من التميز وشكرا على النصيحة (We wish you more excellence and thank you for the advice)
Thank you so much..You are simply the best!
Thank you! And you're welcome!
Can't wait to hear your thoughts about zero day vulnerability log4j
Great video, it's amazing that you are also up to date with the topics of your videos, that is why you made windows 11 as it is new and there are not many courses... Just amazing
damn we love you David, Keep this stuff up bud gooddddd warning
Thank you!
Hi, very good video! I've a question. I've noticed that the keylogger doesn't log the admin password that is required for installing softwares for example, and that made me feel safe. Now, this is a simple script, so can it be updated to log also these hidden keys or is it not possible? Thanks for answer and i'm sorry for my English that isn't very good 😅
hear we go again with a amazing video ❤️
Excelente, contenido de gran calidad. Muchas gracias David.
Thank you very much!
-Great content Professor David Bombal...!!!
-People always ask me what is the best language to learn and I always return the question, "Best language for what...?".
-C and C++ are the languages where OSs are usually written and even today code for devices such as IOTs is written in C (devices how run without a OS), as is the case with Arduino, and others. besides many backends and made in C or java.
-Python is a scripting language and in the 90s when I learned to program I learned Assembly (Low level machine language) and C++ (which is a high level language), but scripting languages at that time when they emerged were called High High Level why they needed an OS running for them to run on top.
-The teacher example uses a module that basically downloads the GCC C compiler and compiles it into the stand alone executable using the Python as source.
- Interesting solution this module, the new Raspberry Pi, the Nano if I'm not mistaken, can compile not only from C but from a Python variant for micro devices.
-Thank you very much for the knowledge...!!!
Another great video! Can you do one on dns poisoning how it works and how we can protect ourselves from it?
Great suggestion!
Thanks for the lesson. Just for educational purposes, can you automate the python keylogger to run on one computer and send the keylogs to another computer. In a way such that you can handle security issues within your network. You can see which specific computer in your network was used to do something. I hope you understand what I'm trying to say
Thank you for this great video. Highly valuable information. Really appreciate your efforts in creating a detailed document on top of the video and sharing it with us!
Question: If this code was compiled for Linux distros/mac OS and run on them, would it be any secure than windows?
Thank you. Glad it was helpful Vyas. I would have to create specific code for Linux and macOS to test. This code would not work on either of those platforms.
The keylogger is detected by avast or windows defender david
Thanks for this content ❤️
Wow I like this video, david is there any method download key logger in victim machine but key logger txt store back in attack machine just like a reverse shell reverse back to attack machine?
This is so much information ,thank you very much for this...
Terima Kasih Pak David, semoga ilmu anda dapat berguna untuk kami semuanya. 😇🙏🏼
Thank you
The worst about that type of code is that extremely many commercial programs, do use keylogger-code to trigger events and so on, so it is not straight forward to detect a keylogger and then trigger. Even windows itself is using keyloggers to functioning. You do almost have to detect intend of the program:-)
Python truly is the infosec ops professional’s best friend. I have yet to find something it can’t do.
Too crazy. Thank you for this
You're welcome!
Hi David is your Mac using the latest M1 processor?
David sir.. A question: What if someone develop the same code for a linux distro like the .Deb or .rpm and if I try to execute it, will my distro stop it ? What's your views on it ? Btw Much ❤️ David sir.
No it won't.
i literally have exams and i havent studied, just watching youtube. probably gonna regret this
Go and study!
@@davidbombal i just started, thanks for the motivation
David is the mister Rodgers of InFoSec
hey david im not that expert in to this even knew very little but i do love ur videos..
Did u try Kaspersky in your case. How did it respond as opposed to defender ?
Very knowledgeable video 📹 👌 .. I have request to tell something about CYBER SECURITY ....
Not saying that it's hard to evade Windows Defender, but why should it flag it in the first place if your scripts aren't sending the data outside? it's a local keylogger and a local wifi passwords revealer.
@David Bombal Make a video how to protect your cellphone and notebook in case someone stole them. And what to do next if it happens
Greetings
few modules that come with python the antivirus will detect as malware, that includes shutil, ctypes, sys, os, glob...of course is just happen when you convert it to .exe and as single file....David, do you use Pyinstaller?
In my tests, Windows sees code created with Pyinstaller as malware and removes it. This is why Nuitka was much better in my tests.
@@davidbombal thanks :)
Good video. I have a different question. I created exe file using PyInstaller, it works fine in that computer. If I move that file to other computer regardless of windows or Mac, the exe file is considered as security thread. What I can do to resolve this issue.
I once wrote a french input method, just used the same function as you are using right now. Same tech has different use.
Agreed. Not all code is malicious. Just depends how it is used.
Thanks for the information bro.
Thank you for posting this yt video 😁
So, all files from the Internet must be run and checked in a virtual machine and only there, not in host OS.
Just a little query. Do you like windows 11? cuz I still use windows 10.
The term nuitka is not recognized as the name of a cmdlet, function scri.....
me too, idk how to solve this problem....
Excellent presentation as usual. Thanks for the warning also. Could you please help me with this issue on windows "Your device is missing important security and quality fixes." ? I have tried all the means out there but couldn't get rid off it.
I love this 👍🏼 thank you
You're welcome!
I have a question :
If any software started it should have access to our keyboard for input and it should also able to store that for further use , but is it possible to send that information to someone else's pc without caught by antivirus ?
SORRY FOR BAD ENGLISH 😅
Was waiting for this. 😊 Thanks a lot sir..
You're welcome!
It's also easy (using a tool) to append your malicious executable to an other legit one . So you may think you're launching a real/known program that is working exactly as expected but ... will also execute a malicious code that no one will ever suspect 😱
Agreed.
Videos great btw I’m just curious about that folder named “zz stuff” which was in downloads folder what’s in that i maybe wrong but zz sound kinky tbh
I cannot get the version of nuitka it shows this:
nuitka : The term 'nuitka' is not recognized as the name of a cmdlet, function, script file, or operable program.
Check the spelling of the name, or if a path was included, verify that the path is correct and try again.
At line:1 char:1
+ nuitka --version
+ ~~~~~~
+ CategoryInfo : ObjectNotFound: (nuitka:String) [], CommandNotFoundException
+ FullyQualifiedErrorId : CommandNotFoundException
Why jump between Powershell and CMD? Don't the perform the same task?
im having my exams going on nd i have 3 main exams continues your blessings will motivate me a lot sir ☺️🙃🙏
All the best
I'm really enjoying this video but I'm stuck at installing Nuitka. I'm on Windows 10 if that makes a difference. I am getting this error: "The installer has insufficient privileges to access this directory: C:\Program Files\WindowsApps\...\Scripts. The installation cannot continue. Log on as administrator or contact your system administrator." Run as administrator isn't available. I also tried executing this from an elevated command prompt and received the same error. Can you help? Thanks in advance.
Its not necessarily a malware what did you just code... Because the output is stored locally to your computer, otherwise all of our coded programs would get deleted😅. Try exfiltrating the output from the same binary. For instance create a reverse shell or send it via post request to a server. It might pass in case of post request but thats an issue to demonstrate !!
I did the same test (compiled python code) but it was a (lets encrypt) certificate updating program (as an extension to a monitor software) and windows defender suddenly deleted(!) my program. I had to white list is to keep it usable.
Which best antivirus software at an affordable price for system
Nuitka is no longer supported on windows....ill try to use these steps on my Ubutnu
i have this error on wifi script:
command_output = subprocess.run(["netsh", "wlan", "show", "profiles"], capture_output = True).stdout.decode()
UnicodeDecodeError: 'utf-8' codec can't decode byte 0xa1 in position 45: invalid start byte
how does the keylogger work remotely if we want to use it practically though?
Hey David I am install everything and checking the version in powershell but in power shell it's showing an error
Keep up the good work : )
love your videos
Glad you like them!
can the key logger that actually receives data from the target be only ran on Linux? Or can it be ran on windows as well
Can you do a video on wifiphisher? I found that wifiphisher awhile back and worked really good.
i'm trying to pack my py script into exe to run on another pc using pyinstaller, cx-freeze but no luck, should i try this or do you have some right way to pack the code to exe?
Thank you!
ps: i used nuitka and its ok now
Thank you very much you might have saved life's with this vid
do you have courses in udemy or coursera ?
Hi David! I have a problem with installing Nuitka
hi David thanks - can you share the model of your monitor you are using?
Monitor: amzn.to/3yyF74Y
More stuff: www.amazon.com/shop/davidbombal
The problem is that if everything is made completely idiot proof, same time you make it very inefficient. Like the ability to get global keyevents is a useful feature for power tools that work when you give a key shortcut.
it is funny because I made a script in python for task automation at work, I d like my colleagues to be able to use it however the .exe generated with nuitka keeps getting flagged as a Virus... No way for them to use it
Do someone now how I can convert python file into macOS program but whitout py2app?
thx Mr.David
plz more and more
and we need about android and ios
thx again you are the best
You're welcome!
Hey I am a beginner security analyst I have an executable files as you show is there any to reverse this so we may know about the real attacker
If you run the exe file. What you can do to not have the keylogger anymore?
Or works only while exe file is open?
Does this method also work for powershell 2 EXE? Is everything compiled in a EXE just gonna run?