From 40ee2bc0052feb0dccf76257df1f6840f025ca19 Mon Sep 17 00:00:00 2001 From: 0xInfection Date: Fri, 29 Mar 2019 11:19:02 +0530 Subject: [PATCH] Added a script for easy payload obfuscation --- others/README.md | 34 ++++++++++++++++++++++++++ others/obfu.py | 62 ++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 96 insertions(+) create mode 100644 others/README.md create mode 100644 others/obfu.py diff --git a/others/README.md b/others/README.md new file mode 100644 index 0000000..7d6ac81 --- /dev/null +++ b/others/README.md @@ -0,0 +1,34 @@ +## [`obfu.py`](https://github.com/0xinfection/awesome-waf/blob/master/other/obfu.py) +> A small script to encode and obfuscate your payloads easily to your desired encodings. + +### Usage: +``` +$ python obfu.py -h + + OBFUSCTOR + +usage: python3 obfu.py [-h] [-s STR] [-e ENC] [-ueo] [-udi] + +Required Arguments: + -s STR, --str STR String to obfuscate + -e ENC, --enc ENC Encoding type. eg: ibm037, utf16, etc + +Optional Arguments: + -ueo URL Encode Output + -udi URL Decode Input +``` +### Example Usage: +``` +python3 obfu.py -s param= 1: + parser.print_help() + quit() + print('Input: %s' % (args.str)) + print('Output: %s' % (paramEncode(params=args.str, charset=args.enc, urlDecodeInput=args.udi, urlEncodeOutput=args.ueo))) + +if __name__ == '__main__': + main() \ No newline at end of file