PowerShell Payload Playground

Interactive playground for exploring PowerShell obfuscation and execution techniques. Demonstrates common encoding and evasion patterns used in living-off-the-land attacks.

By Mohamed Habib JaouadiDecember 1, 2025
Post Related
#powershell
#living-off-the-land
#obfuscation
#defense-evasion
#windows
#red-team
PowerShell Obfuscation Playground
Experiment with common LOTL obfuscation techniques to understand evasion patterns.
Obfuscated Output
powershell.exe -EncodedCommand

Defense Tip

Script Block Logging (Event ID 4104) captures the deobfuscated payload at the moment of execution.

Evasion Logic

Attackers shorten parameters like -enc to bypass simple regex detections.