#Obfuscated

HowToPhil (Phillip R)howtophil
2025-11-09

If they know you have an file, they can begin work cracking it.
If you have an file, they may never even know it's there.

2025-09-24

another one from #TheCrux

"Would you like to annoy your security team even more than usual? Why not create #obfuscated links to regular websites that look like phishing attempts with Phishy URL?"

phishyurl.com

this is hilarious @daedalus thanks from my DEVs 😆🐡 #phish #urls

Wulfy—Speaker to the machinesn_dimension@infosec.exchange
2025-07-19

Here is a cool, novel advanced #algorithm for tracking #stealth and can be used for #asteroid tracking, #spacejunk etc

Also. These mosaiced screen video, you can read the #obfuscated text.
#opsec #infosec implications

"pixel voxel motion projection"

m.youtube.com/watch?v=zFiubdrJ

#algo #compsci

🚨 #Obfuscated BAT file used to deliver NetSupport RAT

At the time of the analysis, the sample had not yet been submitted to #VirusTotal ⚠️

👨‍💻 See sandbox session: app.any.run/tasks/db6fcb53-6f1

🔗 Execution chain:
cmd.exe (BAT) ➡️ #PowerShell ➡️ PowerShell ➡️ #client32.exe (NetSupport client) ➡️ reg.exe

Key details:
🔹 Uses a 'client32' process to run #NetSupport #RAT and add it to autorun in registry via reg.exe
🔹 Creates an 'Options' folder in %APPDATA % if missing
🔹 NetSupport client downloads a task .zip file, extracts, and runs it from %APPDATA%\Application .zip
🔹 Deletes ZIP files after execution

❗️ BAT droppers remain a common choice in attacks as threat actors continue to find new methods to evade detection.

Use #ANYRUN’s Interactive Sandbox to quickly trace the full execution chain and uncover #malware behavior for fast and informed response.

#cybersecurity #infosec

🚨 New #phishing campaign uses #DBatLoader to drop #Remcos RAT.
The infection relies on #UAC bypass with mock directories, obfuscated .cmd scripts, Windows #LOLBAS techniques, and advanced persistence techniques. At the time of analysis, the samples had not yet been submitted to #VirusTotal ⚠️

🔗 Execution chain:
#Phish ➡️ Archive ➡️ DBatLoader ➡️ CMD ➡️ SndVol.exe (Remcos injected)

👨‍💻 #ANYRUN allows analysts to quickly uncover stealth techniques like LOLBAS abuse, injection, and UAC bypass, all within a single interactive analysis session. See analysis: app.any.run/tasks/c57ca499-51f

🛠️ Key techniques:
🔹 #Obfuscated with #BatCloak .cmd files are used to download and run #payload.
🔹 Remcos injects into trusted system processes (SndVol.exe, colorcpl.exe).
🔹 Scheduled tasks trigger a Cmwdnsyn.url file, which launches a .pif dropper to maintain persistence.
🔹 Esentutl.exe is abused via LOLBAS to copy cmd.exe into the alpha.pif file.
🔹 UAC bypass is achieved with fake directories like “C:\Windows “ (note the trailing space), exploiting how Windows handles folder names.

⚠️ This threat uses multiple layers of stealth and abuse of built-in Windows tools. Behavioral detection and attention to unusual file paths or another activity are crucial to catching it early. #ANYRUN Sandbox provides the visibility needed to spot these techniques in real time 🚀

2024-12-25

I had an idea for a new sequence simulator. Generate two random sequences and then define a rate for a third sequences which is a blend of the two. Code is below, though slightly obfuscated.

#bioinformatics #obfuscated

Obfuscated C code for a sequence simulator
2024-12-04

Anyone good in analyzing obfuscated javascript and can tell me what happens here?
pastebin.com/Taj4esdY

#javascript #obfuscated #blueteam #security #malware

2024-04-09

Some kind of #obfuscated #JavaScript #exploit targetting G2A users (lol)

PDF linked on PasteBin directs users to install a #Tampermonkey script.

hxxps://textbin.net/raw/awsj07eiit

#Malware

salix sericea (@Ripple13216)salixsericea
2023-12-24

Getting ready to work over the with a large supply of homemade

[ name: .]

Thumbprint cookies with various jelly fillings.
FeralRobotsFeralRobots
2023-04-17

The result will be pervasive, .

New Submissions to TMLRtmlrsub@sigmoid.social
2023-02-10

TOFU: Towards Obfuscated Federated Updates by Encoding Weight Updates into Gradients from Proxy Data

openreview.net/forum?id=ab2l0R

#privacy #obfuscated #encryption

Je suis aidé sans aucun doute 🙄
#microsoft #obfuscated

Copie d'écran de l'updater de WIndows 10 qui présente une erreur de mise à jour avec le message suivant en anglais : "There were some problems installing updates, but we'll try again later. If you keep seeing this and want to search the web or contact support for information, this may help: (0x800f020b)"
Le code d'erreur et le bout de phrase "this may help" sont sous lignés en rouge.
2022-11-30

Well it's officially released: my first analysis of JS obfuscated malware. Hope you enjoy!
polaryse.github.io/posts/vjw0r

#reverseengineering #malwareanalysis #vjw0rm #javascript #obfuscated

Lucius :archlinux: :flag_be:lucius@mastodon.eric.ovh
2022-10-19

j'adore lire ce genre de mail de dingue sur la #securite (yolo on est des ouf) :
"La #obfuscated# passe à un niveau de sécurité plus élevé pour la création de mot de passe, qui nécessite désormais 12 caractères au lieu de 8. Toutefois, votre mot de passe ne doit pas dépasser 30 caractères. "

sur un site "important", ils sont un mail que si mon compte se fait trouer, ils rigoleront pas : 8 caractères lettres aA et chiffres only

Mais bon ....

2021-01-06

OMG. Over 20 years of C programming, and I had no idea that printf can change a variable's value. Wow.

"
%n takes a pointer and writes (!!) the number of bytes printed so far.

[...]

For example, the following expression

printf("%1$.*2$d%3$hhn", 5, 10, &x)

will have the same effect as if we had written

x = 10;
"

ioccc.org/2020/carlini/index.h

#obfuscated #c #programming

2020-08-18

#NixNet is cool!
#obfuscated #sh #script!🤔🐚📜
set `head -1 $0|cut -c2-` social.nixnet.services/ amolith/ nix.html \< iframe \> embed script
q=$4@$5tagged/$1;v=echo;b=;f=2;z=1
$v "$7pre$9`cat $0`$7/pre$9$7$11 src=$4$10.js$9$7/$11$9">$6
while [ $f != 1 ]||[ $z -lt 3 ];do
q=`curl -sL $q`
b=$b\ `$v "$q"|grep $4@$5[0-9]|cut -d\" -f6`
q=`$v "$q"|grep ad-m|cut -d\" -f4`
f=`$v "$q"|wc -l`;q=`$v "$q"|tail -1`
z=$((z+1));done;for l in $b;do
$v $7$8 height=650 src=$l/$10$9$7/$8$9
done|uniq>>$6;xdg-open $6

the script again, this time with a different instance and user
2020-08-18

#LBRY is awesome!
#obfuscated #sh #script!🤔🐚📜
set `head -1 $0|cut -c2-` fosstodon.org/ johanv/ lbry.html \< iframe \> embed script
q=$4@$5tagged/$1;v=echo;b=;f=2;z=1
$v "$7pre$9`cat $0`$7/pre$9$7$11 src=$4$10.js$9$7/$11$9">$6
while [ $f != 1 ]||[ $z -lt 3 ];do
q=`curl -sL $q`
b=$b\ `$v "$q"|grep $4@$5[0-9]|cut -d\" -f6`
q=`$v "$q"|grep ad-m|cut -d\" -f4`
f=`$v "$q"|wc -l`;q=`$v "$q"|tail -1`
z=$((z+1));done;for l in $b;do
$v $7$8 height=650 src=$l/$10$9$7/$8$9
done|uniq>>$6;xdg-open $6

modified script, this time fetching my toots with the #LBRY tag

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst