About Invoke-Obfuscation
Invoke-Obfuscation is a powerful PowerShell code obfuscation tool that is compatible with PowerShell
v2.0+, can help researchers obfuscate PowerShell commands and script codes.
Tool purpose
Many cyber attackers and commercial malware are using some very basic code obfuscation techniques and try to hide most commands from the command line arguments of powershell.exe. Therefore, Invoke-
The main purpose of Obfuscation is to help blue team researchers test and research PowerShell
There may be command confusion issues in the syntax of v2.0-v5.0 in order to improve the detection capabilities of researchers and anti-virus products.
Tool download
The complete source code of the project has been hosted on GitHub, so researchers can directly use the following command to clone the project source code locally:
git clone https://github.com/danielbohannon/Invoke-Obfuscation.git
Tool installation
We can directly install and call Invoke-Obfuscation using the following commands:
Import-Module ./Invoke-Obfuscation.psd1 Invoke-Obfuscation
Tool usage
While all obfuscation layers are built into separate scripts, most users will find that Invoke-
Obfuscation is very easy to use because it allows you to use and study obfuscation techniques for PowerShell code and commands in a visual form. The tool running command is as follows:
Import-Module ./Invoke-Obfuscation.psd1 Invoke-Obfuscation
Screenshot of tool running
License Agreement
The development and release of this project follows [ Apache -2.0](https://github.com/danielbohannon/Invoke-
Obfuscation/blob/master/LICENSE) open source license agreement.
Project address
Invoke-Obfuscation: [
GitHub Portal】
tps://github.com/danielbohannon/Invoke-Obfuscation)】
Network security learning route
This is an overview of the learning route outline for network security from basic to advanced. Friends, please remember to click and add it to your collection!
Edit
Phase 1: Basic Introduction
Introduction to Cyber Security
Penetration Testing Basics
Network basics
Operating system basics
Web security basics
Database basics
Programming basics
CTF basics
After completing this stage, you can earn an annual salary of 150,000 +
Phase 2: Technical advancement (you are considered a beginner at this step)
Weak passwords and password blasting
XSS vulnerability
CSRF vulnerability
SSRF vulnerability
XXE vulnerability
SQL injection
Arbitrary file manipulation vulnerability
Business logic vulnerability
The annual salary after completing this stage is 250,000 +
Stage 3: High-level improvement
Deserialization vulnerability
RCE
Comprehensive shooting range practical project
Intranet penetration
Traffic Analysis
Log analysis
Malicious code analysis
Emergency Response
Practical training
After completing this stage, you can earn an annual salary of 300,000 +
Phase 4: Blue Team Course
Blue Team Basics
Blue team advanced
This section focuses on the defense of the blue team, the network security engineers who are more easily understood by everyone.
With both offense and defense, the annual salary can reach 400,000+
Phase 5: Interview Guide &Phase 6: Upgraded Content
You need the network security supporting videos, source codes and more network security related books & interview questions corresponding to the above roadmap.
If you are interested in getting started with network security, you can click here if you need it Big benefits of network security: Getting started & advanced full set of 282G learning resource package to share for free!
Students can scan the QR code below to get it!