Creating Python executables during an offensive security engagement used to be an effective method of evasion. However, this tactic has become increasingly difficult on modern Windows endpoints.
In fact, even benign programs seem to get blocked immediately after touching disk. This is just one of the reasons red teamers have moved away from popular frameworks such as Veil-Evasion and onto bigger-better things.
This post revisits compiled Pythons use in offensive security testing and shares experiences launching Meterpreter shells on a fully patched Windows 10 system against Windows Defender. https://breachtactics.com/blog/pythonic-malware/