Projects STRLCPY Invoke-Stealth Files
Enable build support by adding .buildspec.yml
.github Loading last commit info...


Invoke-Stealth is a Simple & Powerful PowerShell Script Obfuscator.

This tool helps you to automate the obfuscation process of any script written in PowerShell with different techniques. You can use any of them separately, together or all of them sequentially with ease, from Windows or Linux.


  • Powershell 4.0 or higher
  • Python 3*

*Required to use all features


It is recommended to clone the complete repository or download the zip file. You can do this by running the following command:

git clone

You can also download the limited version as follows:

powershell iwr -useb -outfile Invoke-Stealth.ps1


.\Invoke-Stealth.ps1 -help

Info:  This tool helps you to automate the obfuscation process of
       any script written in PowerShell with different techniques

Usage: .\Invoke-Stealth.ps1 script.ps1 -technique Chimera
         - You can use as single or separated by commas -

       · Chameleon: Substitute strings and concatenate variables
       · BetterXencrypt: Compresses and encrypts with random iterations
       · PyFuscation: Obfuscate functions, variables and parameters
       · ReverseB64: Encode with base64 and reverse it to avoid detections
       · PSObfuscation: Convert content to bytes and encode with Gzip
       · All: Sequentially executes all techniques described above

Warning: The output script will exponentially multiply the original size
         Chameleon & PyFuscation need Python3 to work properly


This project is licensed under the GNU 3.0 license - see the LICENSE file for more details.

Credits and Acknowledgments

This script has been created and designed from scratch by Joel Gámez Molina // @JoelGMSec

Some modules use third-party code, scripts, and tools, particularly:

Chameleon by klezVirus -->

BetterXencrypt by GetRektBoy724 -->

PyFuscation by CBHue -->

PSObfuscation by gh0x0st -->


This software does not offer any kind of guarantee. Its use is exclusive for educational environments and / or security audits with the corresponding consent of the client. I am not responsible for its misuse or for any possible damage caused by it.

For more information, you can find me on Twitter as @JoelGMSec and on my blog


You can support my work buying me a coffee:


Please wait...
Page is in error, reload to recover