javascript-obfuscator
javascript-obfuscator javascript-obfuscator is the powerhouse for mangling JS code into unreadable spaghetti, applying dead code insertion, string array encoding, and control flow flattening to evade static analysis in web exploits. Clone the repo, run via npm for custom presets, and transform scripts for payload delivery without losing functionality. Open-source and highly configurable, it's the code chameleon for pentesters hiding malicious JS in plain sight.
Explore →Invoke-Obfuscation
Invoke-Obfuscation Invoke-Obfuscation is the PowerShell obfuscation framework that layers string encoding, variable renaming, and token manipulation to cloak scripts from AMSI and EDR detection during post-ex delivery. Fire up its interactive mode to build evasion chains, testing against local defenses before deployment. Open-source from danielbohannon, it's the stealth sculptor for red-teamers crafting undetectable Windows payloads.
Explore →Shellter
Shellter Shellter is the dynamic injector that embeds shellcode into legitimate EXEs via API hashing and dynamic resolution, obfuscating payloads to bypass AV while preserving host app behavior. Compile from C++ source, target benign binaries, and generate stealthy droppers for your toolkit. Open-source and injection-savvy, it's the Trojan tailor for individuals engineering undetectable implants.
Explore →PyArmor
PyArmor PyArmor is the Python script protector that wraps code in obfuscated bytecode, adding anti-debug traps and runtime checks to thwart reverse engineering in deployed tools. Install via pip, obfuscate modules with one command, and distribute tamper-resistant packages for your projects. Open-source core with pro features, it's the veil weaver for devs shielding sensitive logic from prying eyes.
Explore →obfuscator-llvm
obfuscator-llvm obfuscator-llvm is the compiler-level obfuscator that flattens control flow, inserts bogus branches, and substitutes instructions in C/C++ binaries for resilient evasion against disassembly. Patch your LLVM build from source, compile code with -mllvm flags, and produce hardened exes for analysis resistance. Open-source legacy from LLVM, it's the structural surgeon for low-level devs fortifying firmware.
Explore →JSFuck
,()!+), turning functional code into unreadable brain-melt for ultimate obfuscation in XSS or bookmarklets. Paste your script into the generator, tweak for size, and embed the monstrosity in payloads. Open-source and mind-bending, it's the character-constrained contortionist for web hackers pushing encoding limits." class=""]
Explore →PyObfuscate
PyObfuscate PyObfuscate is the Python code scrambler that renames vars, encodes strings, and adds junk ops to disguise scripts for evasion in automated tools or red-team drops. Run the obfuscator on your .py files, customizing levels for balance between stealth and readability. Open-source and script-focused, it's the disguise artist for pentesters cloaking Python payloads in plain view.
Explore →obfuscator
obfuscator obfuscator is the versatile JS minifier-obfuscator that compresses and mangles code with symbol renaming, dead code elimination, and string splitting for web app hardening or exploit hiding. npm install and process files with CLI options, tuning for gzip savings or evasion strength. Open-source and production-ready, it's the compactifier for frontend devs layering defenses in client-side chaos.
Explore →StringObfuscator
StringObfuscator StringObfuscator is the targeted tool for encoding sensitive strings in code, swapping literals with hex arrays or rot13 to thwart static scanners in source reviews. Integrate its JS lib to process templates, generating variants for diversified payloads. Open-source and string-centric, it's the whisperer for coders embedding secrets without leaving plaintext trails.
Explore →AV-Evasion-Toolkit

