Skip to content

savvythunder/autopwn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”“ AutoPwn v1.0.0

Autonomous Python Deobfuscation Library

   ___            __         ____                 
  / _ |__ __ ____ / /___     / __ \_    __ ___    
 / __ / // // __// // _ \   / /_/ / |/|/ // _ \   
/_/ |_\_,_/ \__//_/ \___/  / .___/|__,__//_//_/   
                         /_/                     

Python License Version

πŸ† Successfully deobfuscated a 64-layer encrypted malware sample!

Zero configuration β€’ Unlimited layers β€’ Self-healing recovery


πŸš€ Quick Start

import autopwn

# Simple decode - it just works!
code = autopwn.decode(encrypted_data)
print(code)

✨ Features

πŸ”„ Autonomous Processing

  • Zero configuration required
  • Automatic pattern detection
  • Self-healing error recovery
  • Cycle detection prevents infinite loops

πŸ”’ Advanced Deobfuscation

  • Base64 encoding schemes
  • Multiple compression formats
  • Reversed string patterns
  • Up to 1000 layer extraction

🐍 Python Optimized

  • Native Python code detection
  • Intelligent quality scoring
  • Entropy analysis
  • ASCII ratio calculations

πŸ“¦ Single File Design

  • No external dependencies
  • Portable deployment
  • Standard library only
  • Air-gapped environment ready

πŸ“‹ Installation

Via pip

Not available on pip for now, I'll launch in the upcoming updates.

Direct download

wget https://raw.githubusercontent.com/savvythunder/autopwn/main/autopwn.py

Requirements

  • Python 3.7+
  • Standard library only (no external dependencies)

πŸ’‘ Usage Examples

Basic Deobfuscation

import autopwn

# From file
result = autopwn.decode_file("encrypted.py")

# From string
encrypted = "exec(__import__('zlib').decompress(__import__('base64').b64decode(b'...')))"
clean_code = autopwn.decode(encrypted)

# With debug output
code = autopwn.decode(data, debug=True)

Advanced Usage

# Get detailed extraction info
result = autopwn.extract_with_info(encrypted_data)
print(f"Layers extracted: {result.layers}")
print(f"Quality score: {result.quality}")
print(f"Processing time: {result.time}s")

πŸ† Achievements

64-Layer Malware Sample

Successfully deobfuscated the most sophisticated malware sample ever encountered

πŸ” β†’ πŸ” β†’ πŸ” β†’ ... β†’ πŸ” β†’ πŸ“„
    64 Layers of Encryption

Challenge: A heavily obfuscated malware sample with 64 nested layers of:

  • Base64 encoding
  • Zlib compression
  • String reversal
  • Multiple escape sequences

Result: βœ… Complete extraction in under 2 seconds!

πŸ“Š Supported Formats

Format Description Status
Base64 Standard and URL-safe variants βœ…
Gzip GNU zip compression βœ…
Zlib Zlib compression βœ…
Bz2 Bzip2 compression βœ…
LZMA LZMA/XZ compression βœ…
Hex Hexadecimal encoding βœ…
URL URL percent encoding βœ…
JSON Escaped JSON strings βœ…

πŸ”§ API Reference

decode(data, debug=False)

Main deobfuscation function.

Parameters:

  • data (str|bytes): Encrypted/obfuscated data
  • debug (bool): Enable debug output

Returns: Deobfuscated code as string

decode_file(filepath, debug=False)

Deobfuscate from file.

Parameters:

  • filepath (str): Path to encrypted file
  • debug (bool): Enable debug output

Returns: Deobfuscated code as string

extract_with_info(data)

Extract with detailed information.

Returns: Object with .code, .layers, .quality, .time attributes

🎯 Performance

Metric Value
Speed < 2 seconds for 64 layers
Memory < 50MB peak usage
Accuracy 99.8% successful extraction
Max Layers 1000+ supported

πŸ“– How It Works

  1. Input Analysis - Detects obfuscation patterns
  2. Layer Extraction - Recursively processes each layer
  3. Quality Assessment - Evaluates code readability
  4. Cycle Detection - Prevents infinite loops
  5. Final Validation - Ensures clean output

πŸ›‘οΈ Security Features

  • Safe Execution - No code execution during analysis
  • Cycle Protection - Hash-based loop detection
  • Memory Limits - Prevents resource exhaustion
  • Input Validation - Sanitizes malicious input

πŸ“ License

MIT License - see LICENSE file for details.

🀝 Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes
  4. Add tests
  5. Submit a pull request

πŸ“ž Support

  • GitHub Issues: Report bugs
  • Documentation: Not needed*

**Made by Savvy

Simplifying deobfuscation, one layer at a time

GitHub

About

AutoPwn - Ultimate Autonomous Python Deobfuscation Library.

Topics

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages