Obscura
No description available
Install / Use
/learn @Hysocs/ObscuraREADME
Obscura - Python Code Obfuscation Tool
Obscura is a Python code obfuscation tool designed to protect your source code from reverse engineering and tampering. This is a learning project for me, and while it includes a variety of obfuscation techniques, please note that it may not be as robust as other well-known public methods. Some features are theoretical and may not work as expected.
🌟 Key Features
🛡️ Code Obfuscation Techniques
- Inline Code Obfuscation: Replaces inline code with obfuscated code.
- Control Flow Obfuscation: Obfuscates the control flow to make it harder to understand the code logic.
- Control Flow Flattening: Flattens the control flow to add complexity to the code structure.
- Function Mirroring: Creates mirrored functions to add redundancy and confusion.
- Obfuscate Identifiers: Obfuscates function, class, and variable names.
- Obfuscate Constants: Changes constants to obfuscated forms.
- Number to Hex Conversion: Converts numbers to hexadecimal format.
- Opaque Predicates: Inserts opaque predicates to make the code harder to analyze.
- Insert Dummy Variables & Args: Adds dummy variables and arguments to functions.
🔒 Encryption
- Code Encryption: Encrypts code with various methods such as AES, Base64, Hybrid (Anti-V), and Hybrid Hash (Custom Method).
- Inject Anti-Debug: Adds anti-debugging mechanisms to the encrypted code.
- Re-Obfuscate Decryption Stub: Re-obfuscates the decryption stub for added security.
📉 Compression
- Compress Code: Compresses the obfuscated code to reduce its size and add another layer of obfuscation.
- Compression Repeats: Allows multiple compression iterations for increased complexity.
🛠️ Project Obfuscation (To be implemented)
- Folder Obfuscation: Will allow obfuscation of all .py files in a folder, handling cross-references and dependencies.
🖼️ Screenshots
<table> <tr> <td><img src="https://i.imgur.com/QRO0UFD.png" alt="Screenshot1"></td> <td><img src="https://i.imgur.com/8Dg66jz.png" alt="Screenshot2"></td> </tr> </table>Getting Started
- Clone or download the Obscura repository to your local machine.
- Ensure you have Python and the required dependencies installed.
- Run the
main.pyfile to launch the obfuscation tool. - Use the application to obfuscate your Python files by selecting the desired options.
For detailed usage instructions and troubleshooting, please refer to the repository's documentation.
🚧 Disclaimer
This project is a work in progress and is intended for learning purposes only. Some features may not work as expected, and the obfuscation techniques may not provide the same level of protection as other well-known methods. Use it at your own risk and do not rely on it for critical security purposes.
Note: This code is designed to be run in a development environment like Visual Studio Code with a virtual environment (venv). It is not formatted for compilation using PyInstaller or any other compiler.
Related Skills
node-connect
336.5kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
claude-opus-4-5-migration
82.9kMigrate prompts and code from Claude Sonnet 4.0, Sonnet 4.5, or Opus 4.1 to Opus 4.5
frontend-design
82.9kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
model-usage
336.5kUse CodexBar CLI local cost usage to summarize per-model usage for Codex or Claude, including the current (most recent) model or a full model breakdown. Trigger when asked for model-level usage/cost data from codexbar, or when you need a scriptable per-model summary from codexbar cost JSON.
