ObfuXtreme is an advanced Python obfuscation tool designed to bypass antivirus detection and remain undetectable on VirusTotal.
✔ Produces highly obfuscated Python code
✔ Evades static detection
✔ Built using safe AST transformations
✔ Ideal for security research, analysis, reverse-engineering studies
Caution
Use responsibly and ethically. ObfuXtreme is a Proof-of-Concept (PoC) tool created strictly for education, research, and defensive cybersecurity purposes.
- Obfuscating malware
- Bypassing security products
- Evading detection for malicious purposes
- Any illegal or unethical activity
The developers take no responsibility for misuse. By using ObfuXtreme, you accept full responsibility for your actions and agree to comply with all applicable laws.
| Feature | Status | Notes |
|---|---|---|
| AES-256-CBC Encryption | ✅ | Encrypts strings + bytes using per-build random key and IV |
| Key Splitting (XOR) | ✅ | Keys are split into multiple XOR parts to avoid static extraction |
| AST-Level Obfuscation | ✅ | Safe transformations using Python ast module |
| Variable Renaming | ✅ | Renames locals only to avoid breaking keyword arguments |
| Safe Control Flow Flattening | ✅ | Only flattens simple functions (no return, break, continue, with, try, yield, async) |
| Opaque Predicates | ✅ | Inserts junk conditional blocks to disrupt static analysis |
| String & Bytes Encryption | ✅ | All string and bytes literals are AES-encrypted |
| Per-Build Random Polymorphism | ✅ | Different output every time |
| Anti-Debugging | ✅ | Detects sys.gettrace() & Windows debugger |
| Cross-Platform | ✅ | Works on Windows, Linux, macOS |
| Silent Failure Handling | ✅ | Decrypt functions fail silently to avoid leaking details |
| VT Friendly (Research Only!) | Obfuscated scripts are harder for static AV engines to classify |
- No more broken functions
- No more argument name renaming (fixes keyword calls)
- No more
UnboundLocalError - Handles complex codebases reliably
- Flattens only pure sequential functions
- Skips anything that may break semantic behavior
- Auto-initializes real locals
- Never touches arguments (
self,request, etc.)
_KEY_PARTS = [random1, random2, final_xor]
_KEY = XOR(all_parts)
Makes static extraction significantly harder.
String & bytes constants both get AES-encrypted.
Every build uses unique random identifiers.
These results highlight the effectiveness of structural obfuscation for research and analysis, NOT for malicious intent.
git clone https://github.com/spyboy-productions/ObfuXtreme.git
cd ObfuXtreme
pip install -r requirements.txtpython ObfuXtreme.py your_script.pyOR
python ObfuXtreme.py your_script.py obfuscated.py
A file named:
obfuscated.py
python obfuscated.pypython light_ObfuXtreme.py your_script.py- Machine-bound execution module (“run only on this PC”)
- Obfuscated password-protected decryption
- Auto .exe generation after obfuscation
- Junk code generation levels (Low/Medium/Hard/Extreme)
- Add optional metamorphic transformations


