Cuteit – IP Obfuscator Made to Make a Malicious IP a Bit Cuter

Cuteit IP obfuscator made to make a malicious ip a bit cuter.

A simple python tool to help you to social engineer, bypass whitelisting firewalls, potentially break regex rules for command line logging looking for IP addresses and obfuscate cleartext strings to C2 locations within the payload.

All of that is simply done with obfuscating ip to many forms.

Also Read – Ntopng : Web-based Traffic & Security Network Traffic Monitoring

Usage

usage: Cuteit.py [-h] [–disable-coloring] ip
positional arguments:
ip IP you want to convert
optional arguments:
-h, –help show this help message and exit
–disable-coloring Disable colored printing

Screenshot

Using it as a module!

You can use this script as a module in your python scripts as follows:

import Cuteit
convert = Cuteit.lib(ip)
print(convert.hex)

and the photo bellow shows that in action:

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

12 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

12 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

12 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

12 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

13 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

15 hours ago