<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Localtonet</title>
    <description>The latest articles on DEV Community by Localtonet (@localtonet_9bc198a0885334).</description>
    <link>https://dev.to/localtonet_9bc198a0885334</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3744380%2F2c38622c-9b8d-4181-86ea-5d06915e315d.png</url>
      <title>DEV Community: Localtonet</title>
      <link>https://dev.to/localtonet_9bc198a0885334</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/localtonet_9bc198a0885334"/>
    <language>en</language>
    <item>
      <title>[Boost]</title>
      <dc:creator>Localtonet</dc:creator>
      <pubDate>Sun, 15 Feb 2026 16:29:11 +0000</pubDate>
      <link>https://dev.to/localtonet_9bc198a0885334/-1e54</link>
      <guid>https://dev.to/localtonet_9bc198a0885334/-1e54</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/localtonet_9bc198a0885334" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3744380%2F2c38622c-9b8d-4181-86ea-5d06915e315d.png" alt="localtonet_9bc198a0885334"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/localtonet_9bc198a0885334/obfusps-building-a-smart-ast-aware-powershell-obfuscation-engine-in-go-1oeo" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;ObfusPS — Building a Smart, AST-Aware PowerShell Obfuscation Engine in Go&lt;/h2&gt;
      &lt;h3&gt;Localtonet ・ Feb 15&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
    </item>
    <item>
      <title>ObfusPS — Building a Smart, AST-Aware PowerShell Obfuscation Engine in Go</title>
      <dc:creator>Localtonet</dc:creator>
      <pubDate>Sun, 15 Feb 2026 16:29:01 +0000</pubDate>
      <link>https://dev.to/localtonet_9bc198a0885334/obfusps-building-a-smart-ast-aware-powershell-obfuscation-engine-in-go-1oeo</link>
      <guid>https://dev.to/localtonet_9bc198a0885334/obfusps-building-a-smart-ast-aware-powershell-obfuscation-engine-in-go-1oeo</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2nx5g3a49wadzh70znts.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2nx5g3a49wadzh70znts.png" alt=" " width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I built ObfusPS as a research-oriented PowerShell obfuscation framework focused on one constraint above everything else:&lt;br&gt;
Obfuscation must not change runtime behavior.&lt;/p&gt;

&lt;p&gt;The project explores structural and encoding-based transformations while preserving deterministic execution and providing runtime validation.&lt;/p&gt;

&lt;p&gt;This article explains the design principles behind the engine.&lt;/p&gt;

&lt;p&gt;Core Design Principles&lt;br&gt;
1️⃣ Behavioral Fidelity First&lt;/p&gt;

&lt;p&gt;ObfusPS includes an optional validation system that:&lt;/p&gt;

&lt;p&gt;Executes the original script&lt;/p&gt;

&lt;p&gt;Executes the obfuscated script&lt;/p&gt;

&lt;p&gt;Compares:&lt;/p&gt;

&lt;p&gt;stdout&lt;/p&gt;

&lt;p&gt;stderr&lt;/p&gt;

&lt;p&gt;exit code&lt;/p&gt;

&lt;p&gt;If validation fails, the engine can retry with progressively safer settings.&lt;/p&gt;

&lt;p&gt;Across the internal test matrix (13 scripts × 5 levels × 10 profiles), all combinations passed validation at the time of writing.&lt;/p&gt;

&lt;p&gt;The goal is reproducible transformation — not just visual obfuscation.&lt;/p&gt;

&lt;p&gt;2️⃣ Clear Separation of Responsibilities&lt;/p&gt;

&lt;p&gt;ObfusPS uses a multi-language architecture:&lt;/p&gt;

&lt;p&gt;Component   Role&lt;br&gt;
Go  Core engine (pipeline, packers, RNG, metrics, validation)&lt;br&gt;
PowerShell  Native AST parsing&lt;br&gt;
C# (.NET 8) Optional AST fallback parser&lt;br&gt;
Python  GUI wrapper&lt;/p&gt;

&lt;p&gt;Important architectural decision:&lt;/p&gt;

&lt;p&gt;The Go engine never executes PowerShell.&lt;br&gt;
It produces transformed text only.&lt;br&gt;
Runtime behavior lives entirely in generated PowerShell stubs.&lt;/p&gt;

&lt;p&gt;This simplifies auditing and makes the build reproducible.&lt;/p&gt;

&lt;p&gt;Obfuscation Model&lt;/p&gt;

&lt;p&gt;ObfusPS combines two layers:&lt;/p&gt;

&lt;p&gt;🔹 Pipeline transforms (pre-packing)&lt;/p&gt;

&lt;p&gt;Applied in a defined order:&lt;/p&gt;

&lt;p&gt;Identifier renaming&lt;/p&gt;

&lt;p&gt;String encoding (XOR or RC4)&lt;/p&gt;

&lt;p&gt;String tokenization&lt;/p&gt;

&lt;p&gt;Numeric expression encoding&lt;/p&gt;

&lt;p&gt;Formatting jitter&lt;/p&gt;

&lt;p&gt;Opaque predicates&lt;/p&gt;

&lt;p&gt;Function reordering (safe shuffle)&lt;/p&gt;

&lt;p&gt;Dead code injection&lt;/p&gt;

&lt;p&gt;Optional anti-reverse checks&lt;/p&gt;

&lt;p&gt;Each transform can be enabled manually or via profile.&lt;/p&gt;

&lt;p&gt;🔹 Encoding levels (1–5)&lt;/p&gt;

&lt;p&gt;Five wrapping strategies progressively increase structural complexity:&lt;/p&gt;

&lt;p&gt;Unicode character reconstruction&lt;/p&gt;

&lt;p&gt;Base64 wrapping&lt;/p&gt;

&lt;p&gt;Base64 with intermediate variable indirection&lt;/p&gt;

&lt;p&gt;GZip compression + Base64&lt;/p&gt;

&lt;p&gt;GZip + XOR encryption + fragmentation + polymorphic template&lt;/p&gt;

&lt;p&gt;Level 5 adds:&lt;/p&gt;

&lt;p&gt;32-byte XOR key derived from a seeded LCG&lt;/p&gt;

&lt;p&gt;Fragment shuffling (Fisher–Yates)&lt;/p&gt;

&lt;p&gt;Optional integrity verification&lt;/p&gt;

&lt;p&gt;Maximum fragment count is 256 (auto-scaled).&lt;/p&gt;

&lt;p&gt;Smart Analysis&lt;/p&gt;

&lt;p&gt;ObfusPS includes a static analysis phase with 22+ internal feature detectors.&lt;br&gt;
It evaluates:&lt;/p&gt;

&lt;p&gt;Dynamic invocation patterns&lt;/p&gt;

&lt;p&gt;Module-related constructs&lt;/p&gt;

&lt;p&gt;String complexity&lt;/p&gt;

&lt;p&gt;Control-flow patterns&lt;/p&gt;

&lt;p&gt;Script size and entropy&lt;/p&gt;

&lt;p&gt;The engine produces:&lt;/p&gt;

&lt;p&gt;A complexity score (0–100)&lt;/p&gt;

&lt;p&gt;A recommended profile&lt;/p&gt;

&lt;p&gt;Suggested flags&lt;/p&gt;

&lt;p&gt;This allows either manual configuration or automatic selection.&lt;/p&gt;

&lt;p&gt;Profiles &amp;amp; Determinism&lt;/p&gt;

&lt;p&gt;There are 10 predefined profiles ranging from minimal transformation (safe) to maximum configuration (paranoid, redteam).&lt;/p&gt;

&lt;p&gt;All explicit flags override profile defaults.&lt;/p&gt;

&lt;p&gt;For reproducible builds:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;-seed N
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;ensures deterministic randomness — important for CI/CD and controlled testing scenarios.&lt;/p&gt;

&lt;p&gt;Metrics &amp;amp; Reporting&lt;/p&gt;

&lt;p&gt;After transformation, ObfusPS reports:&lt;/p&gt;

&lt;p&gt;Output size&lt;/p&gt;

&lt;p&gt;Shannon entropy&lt;/p&gt;

&lt;p&gt;Character diversity&lt;/p&gt;

&lt;p&gt;Alphanumeric ratio&lt;/p&gt;

&lt;p&gt;Size ratio (input vs output)&lt;/p&gt;

&lt;p&gt;Line count&lt;/p&gt;

&lt;p&gt;This allows quantitative comparison between strategies instead of relying on visual inspection.&lt;/p&gt;

&lt;p&gt;Scope &amp;amp; Limits&lt;/p&gt;

&lt;p&gt;Input encoding: UTF-8 only&lt;/p&gt;

&lt;p&gt;Output encoding: UTF-8 with BOM&lt;/p&gt;

&lt;p&gt;Max input size: 100 MB&lt;/p&gt;

&lt;p&gt;Fragment limit (level 5): 256&lt;/p&gt;

&lt;p&gt;The tool is intended for:&lt;/p&gt;

&lt;p&gt;Research&lt;/p&gt;

&lt;p&gt;Authorized red/blue team simulation&lt;/p&gt;

&lt;p&gt;IP protection&lt;/p&gt;

&lt;p&gt;It is not designed for unauthorized or malicious usage.&lt;/p&gt;

&lt;p&gt;Why Go?&lt;/p&gt;

&lt;p&gt;The engine is written in Go because it provides:&lt;/p&gt;

&lt;p&gt;Single static binary&lt;/p&gt;

&lt;p&gt;Zero runtime dependency&lt;/p&gt;

&lt;p&gt;Cross-platform compilation&lt;/p&gt;

&lt;p&gt;Deterministic execution model&lt;/p&gt;

&lt;p&gt;Strong performance for text-heavy pipelines&lt;/p&gt;

&lt;p&gt;The architecture is intentionally explicit and modular to support auditing and future AST-based improvements.&lt;/p&gt;

&lt;p&gt;Closing Thoughts&lt;/p&gt;

&lt;p&gt;Obfuscation is not just about hiding code.&lt;/p&gt;

&lt;p&gt;It is about:&lt;/p&gt;

&lt;p&gt;Controlled transformation&lt;/p&gt;

&lt;p&gt;Deterministic randomness&lt;/p&gt;

&lt;p&gt;Structural mutation&lt;/p&gt;

&lt;p&gt;Runtime equivalence guarantees&lt;/p&gt;

&lt;p&gt;ObfusPS is an engineering exercise in making those constraints coexist.&lt;/p&gt;

&lt;p&gt;Repository:&lt;br&gt;
&lt;a href="https://dev.tourl"&gt;&lt;/a&gt;&lt;a href="https://github.com/BenzoXdev/ObfusPS" rel="noopener noreferrer"&gt;https://github.com/BenzoXdev/ObfusPS&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>go</category>
      <category>security</category>
      <category>showdev</category>
    </item>
    <item>
      <title>malware builder</title>
      <dc:creator>Localtonet</dc:creator>
      <pubDate>Sat, 31 Jan 2026 20:08:16 +0000</pubDate>
      <link>https://dev.to/localtonet_9bc198a0885334/malware-builder-5213</link>
      <guid>https://dev.to/localtonet_9bc198a0885334/malware-builder-5213</guid>
      <description>&lt;p&gt;&lt;a href="https://github.com/BenzoXdev/Blx-Virus-Builder" rel="noopener noreferrer"&gt;https://github.com/BenzoXdev/Blx-Virus-Builder&lt;/a&gt;&lt;/p&gt;

</description>
      <category>programming</category>
      <category>python</category>
      <category>security</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
