{"id":6450,"date":"2019-09-09T14:12:32","date_gmt":"2019-09-09T08:42:32","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=6450"},"modified":"2019-09-09T14:12:32","modified_gmt":"2019-09-09T08:42:32","slug":"pyfuscation-function-names-variables-parameters","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/","title":{"rendered":"PyFuscation : Obfuscate Powershell Scripts By Replacing Function Names, Variables &#038; Parameters"},"content":{"rendered":"\n<p><strong>PyFuscation<\/strong> is a obfuscate powershell scripts by replacing Function names, Variables and Parameters. It  Requires python3.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>PyFuscation.py [-h] [-f] [-v] [-p] [&#8211;ps SCRIPT]<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/barq-aws-cloud-exploitation-framework\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Barq: The AWS Cloud Post Exploitation Framework (opens in a new tab)\">Barq: The AWS Cloud Post Exploitation Framework<\/a><\/strong><\/p>\n\n\n\n<p>Optional arguments:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">-h, &#8211;help show this help message and exit<br>-f    Obfuscate functions<br>     \u25cb Do this First \u2026 Its probably the most likely to work well<br>-v    Obfuscate variables<br>     \u25cb If your going to obfuscate variables do the parameters too. <br>-p    Obfuscate parameters<br>     \u25cb  If your going to obfuscate parameters do the variables too. <\/p>\n\n\n\n<p><strong>Required arguments: &#8211;ps &lt;SCRIPT&gt; Obfuscate PowerShell script<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">p<strong>ython3 PyFuscation.py -fvp &#8211;ps .\/Scripts\/Invoke-Mimikatz.ps1 <\/strong><\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/CBHue\/PyFuscation\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>PyFuscation is a obfuscate powershell scripts by replacing Function names, Variables and Parameters. It Requires python3. Usage PyFuscation.py [-h] [-f] [-v] [-p] [&#8211;ps SCRIPT] Also Read &#8211; Barq: The AWS Cloud Post Exploitation Framework Optional arguments: -h, &#8211;help show this help message and exit-f Obfuscate functions \u25cb Do this First \u2026 Its probably the most [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15790,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png","fifu_image_alt":"PyFuscation : Obfuscate Powershell Scripts By Replacing Function Names, Variables & Parameters","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[2399,2584,2665],"class_list":["post-6450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-parameters","tag-powershell-scripts","tag-pyfuscation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PyFuscation : Replacing Function Names, Variables &amp; Parameters<\/title>\n<meta name=\"description\" content=\"PyFuscation is a obfuscate powershell scripts by replacing Function names, Variables and Parameters. It Requires python3.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PyFuscation : Replacing Function Names, Variables &amp; Parameters\" \/>\n<meta property=\"og:description\" content=\"PyFuscation is a obfuscate powershell scripts by replacing Function names, Variables and Parameters. It Requires python3.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-09T08:42:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"PyFuscation : Obfuscate Powershell Scripts By Replacing Function Names, Variables &#038; Parameters\",\"datePublished\":\"2019-09-09T08:42:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/\"},\"wordCount\":111,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png\",\"keywords\":[\"Parameters\",\"Powershell Scripts\",\"PyFuscation\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/\",\"name\":\"PyFuscation : Replacing Function Names, Variables & Parameters\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png\",\"datePublished\":\"2019-09-09T08:42:32+00:00\",\"description\":\"PyFuscation is a obfuscate powershell scripts by replacing Function names, Variables and Parameters. It Requires python3.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PyFuscation : Replacing Function Names, Variables & Parameters","description":"PyFuscation is a obfuscate powershell scripts by replacing Function names, Variables and Parameters. It Requires python3.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/","og_locale":"en_US","og_type":"article","og_title":"PyFuscation : Replacing Function Names, Variables & Parameters","og_description":"PyFuscation is a obfuscate powershell scripts by replacing Function names, Variables and Parameters. It Requires python3.","og_url":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-09-09T08:42:32+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"PyFuscation : Obfuscate Powershell Scripts By Replacing Function Names, Variables &#038; Parameters","datePublished":"2019-09-09T08:42:32+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/"},"wordCount":111,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png","keywords":["Parameters","Powershell Scripts","PyFuscation"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/","url":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/","name":"PyFuscation : Replacing Function Names, Variables & Parameters","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png","datePublished":"2019-09-09T08:42:32+00:00","description":"PyFuscation is a obfuscate powershell scripts by replacing Function names, Variables and Parameters. It Requires python3.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/pyfuscation-function-names-variables-parameters\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-8YJzRJzLyBo\/XXTHDtNl4RI\/AAAAAAAACZI\/7IlXdM1lX5cqPjZELjVM-EKBJww_D428ACLcBGAs\/s1600\/PyFuscation%2B%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":28736,"url":"https:\/\/kalilinuxtutorials.com\/invoke-psobfuscation\/","url_meta":{"origin":6450,"position":0},"title":"Invoke-PSObfuscation : An In-Depth Approach To Obfuscating the PowerShell Payload On Windows Or Kali Linux","author":"R K","date":"April 11, 2023","format":false,"excerpt":"Invoke-PSObfuscation is an in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux. Traditional obfuscation techniques tend to add layers to encapsulate standing code, such as base64 or compression. These payloads do continue to have a varied degree of success, but they\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiOVHR2TYSHpWrAOzKTI1ojOBcBr0cvdTVE_71Tbq4z7WqR3MrmhaGfnEPRUIkU12qEk7oQ-wfb-u0DfOOgNbkL8OtOyQ_oz4ITm7KwVQyZP8SOGdvHPSfRANXv0srqIkYyp7BA5arhNNfLhE8mY3nt3ZIbJkpA1DqgkIDkhhIuj06OW90lnqThiqh\/s728\/kali%20temp.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiOVHR2TYSHpWrAOzKTI1ojOBcBr0cvdTVE_71Tbq4z7WqR3MrmhaGfnEPRUIkU12qEk7oQ-wfb-u0DfOOgNbkL8OtOyQ_oz4ITm7KwVQyZP8SOGdvHPSfRANXv0srqIkYyp7BA5arhNNfLhE8mY3nt3ZIbJkpA1DqgkIDkhhIuj06OW90lnqThiqh\/s728\/kali%20temp.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiOVHR2TYSHpWrAOzKTI1ojOBcBr0cvdTVE_71Tbq4z7WqR3MrmhaGfnEPRUIkU12qEk7oQ-wfb-u0DfOOgNbkL8OtOyQ_oz4ITm7KwVQyZP8SOGdvHPSfRANXv0srqIkYyp7BA5arhNNfLhE8mY3nt3ZIbJkpA1DqgkIDkhhIuj06OW90lnqThiqh\/s728\/kali%20temp.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgiOVHR2TYSHpWrAOzKTI1ojOBcBr0cvdTVE_71Tbq4z7WqR3MrmhaGfnEPRUIkU12qEk7oQ-wfb-u0DfOOgNbkL8OtOyQ_oz4ITm7KwVQyZP8SOGdvHPSfRANXv0srqIkYyp7BA5arhNNfLhE8mY3nt3ZIbJkpA1DqgkIDkhhIuj06OW90lnqThiqh\/s728\/kali%20temp.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":12739,"url":"https:\/\/kalilinuxtutorials.com\/invoke-stealth-2\/","url_meta":{"origin":6450,"position":1},"title":"Invoke-Stealth : Simple And Powerful PowerShell Script Obfuscator","author":"R K","date":"May 8, 2021","format":false,"excerpt":"Invoke-Stealth\u00a0is a Simple & Powerful PowerShell Script Obfuscator. This tool helps you to automate the obfuscation process of any script written in PowerShell with different techniques. You can use any of them separately, together or all of them sequentially with ease, from Windows or Linux. Requirements Powershell 4.0 or higherBash*Python\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":27929,"url":"https:\/\/kalilinuxtutorials.com\/codecepticon\/","url_meta":{"origin":6450,"position":2},"title":"Codecepticon : .NET Application That Allows You To Obfuscate C#, VBA\/VB6 (Macros), And PowerShell Source Code","author":"R K","date":"December 16, 2022","format":false,"excerpt":"Codecepticon is a .NET application that allows you to obfuscate C#, VBA\/VB6 (macros), and PowerShell source code, and is developed for offensive security engagements such as Red\/Purple Teams. What separates Codecepticon from other obfuscators is that it targets the source code rather than the compiled executables, and was developed specifically\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQ_J_w8-gjEtr_PM__YhwRCdRqKzVwGUJG7QnreLNMs4H46Y7Do0yLUP9n0AN8z69puPXdySl4MSXHMSdaJ5TMKxobd5XZPjby1svKGV-T8GyudY2UzHM2LukR828H1Y4C-3vWs9Yv9DRIXKSSpnFfUoOdiNhAG_SjusBShS-ZQSJot16cgMUk7EQF\/s728\/Codecepticon1%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQ_J_w8-gjEtr_PM__YhwRCdRqKzVwGUJG7QnreLNMs4H46Y7Do0yLUP9n0AN8z69puPXdySl4MSXHMSdaJ5TMKxobd5XZPjby1svKGV-T8GyudY2UzHM2LukR828H1Y4C-3vWs9Yv9DRIXKSSpnFfUoOdiNhAG_SjusBShS-ZQSJot16cgMUk7EQF\/s728\/Codecepticon1%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQ_J_w8-gjEtr_PM__YhwRCdRqKzVwGUJG7QnreLNMs4H46Y7Do0yLUP9n0AN8z69puPXdySl4MSXHMSdaJ5TMKxobd5XZPjby1svKGV-T8GyudY2UzHM2LukR828H1Y4C-3vWs9Yv9DRIXKSSpnFfUoOdiNhAG_SjusBShS-ZQSJot16cgMUk7EQF\/s728\/Codecepticon1%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgQ_J_w8-gjEtr_PM__YhwRCdRqKzVwGUJG7QnreLNMs4H46Y7Do0yLUP9n0AN8z69puPXdySl4MSXHMSdaJ5TMKxobd5XZPjby1svKGV-T8GyudY2UzHM2LukR828H1Y4C-3vWs9Yv9DRIXKSSpnFfUoOdiNhAG_SjusBShS-ZQSJot16cgMUk7EQF\/s728\/Codecepticon1%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5340,"url":"https:\/\/kalilinuxtutorials.com\/intensio-obfuscator\/","url_meta":{"origin":6450,"position":3},"title":"Intensio Obfuscator : Obfuscate A Python Code 2.x &#038; 3.x","author":"R K","date":"June 14, 2019","format":false,"excerpt":"Intensio Obfuscator is an obfuscate a python code 2.x and 3.x. Takes a python source code and transform it into an obfuscated python code, replace name of variables\/classes\/functions to random chars and defined length, removes comments, line breaks and add to each line a random script with an always different\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12774,"url":"https:\/\/kalilinuxtutorials.com\/invoke-stealth\/","url_meta":{"origin":6450,"position":4},"title":"Invoke-Stealth : Simple And Powerful PowerShell Script Obfuscator","author":"R K","date":"May 10, 2021","format":false,"excerpt":"Invoke-Stealth\u00a0is a Simple & Powerful PowerShell Script Obfuscator. This tool helps you to automate the obfuscation process of any script written in PowerShell with different techniques. You can use any of them separately, together or all of them sequentially with ease, from Windows or Linux. Requirements Powershell 4.0 or higherBash*Python\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6497,"url":"https:\/\/kalilinuxtutorials.com\/activereign-network-enumeration-attack-toolset\/","url_meta":{"origin":6450,"position":5},"title":"ActiveReign : A Network Enumeration &#038; Attack Toolset","author":"R K","date":"September 13, 2019","format":false,"excerpt":"ActiveReign is a network enumeration and attack toolset.A while back I was challenged to write a discovery tool with Python3 that could automate the process of finding sensitive information on network file shares. After writing the entire tool with pysmb, and adding features such as the ability to open and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=6450"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6450\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15790"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=6450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=6450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=6450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}