New: obfuscationAll contenthive-129948hive-196917krsteemzzanhive-183959hive-166405hive-185836photographyhive-180932hive-150122hive-188619hive-184714hive-183397hive-144064hive-145157hive-101145uncommonlabhive-103599bitcoinhive-113376krsuccesshive-193186hive-193637hive-139150TrendingNewHotLikersrustemsoft (32)in dotnet • 23 hours agoObfuscation can impact performance.NET code obfuscation can impact performance, but the degree of impact depends heavily on the specific obfuscation techniques used. Here's a breakdown: Variable/Method Renaming: This is…arbitration (78)in telltale • 10 months agoWhere is my de-obfuscation button.So much hand-wringing around the academic research showing that AI text has telltale vocabulary, as if it were an obscure lexicon. The AI shibboleths hardly seem sesquipedalian; per contra, they…evrone (41)in opensource • 4 years agoOpen-sourcing Datanymizer: in-flight template-driven data anonymizationFakers, anonymizers, and obfuscators — there are various free and open-source data anonymization tools that have been around for a long time and work pretty well, so why did we create a new one? The…apocalypsisopus (25)in dtube • 6 years ago03. Ofuscación y La Naturaleza HumanaCapítulo 03. Ofuscación y La Naturaleza Humana El Despertar (Volumen 01) Despertemos, trascendamos la ofuscación, la manipulación de los ingenieros sociales oscuros. La cultura es una…blackholebridger (50)in the • 6 years agothe deceit of obfuscation~ ~"UK'S DECEIT TIMELINE OF EU MILITARY UNIFICATION."~ ~ 'UK's Treasonous Government the Timeline of Deceit and Obfuscation against it's People and it's Own Country.' 'Curtsy of the UK Column.'…woeih (39)in whatonearthishappening • 6 years agosteemCreated with Sketch.016: Energy Independence, Mind Control, Methods Of Manipulation, Obfuscation etc.Topics Energy Independence, Mind Control, Methods Of Manipulation, Obfuscation, Simplicity vs. Complexity, Principles vs. law, Dominion vs. Fear Of Punishment, Gnosis vs. Belief, Individuality vs.…woeih (39)in woeih • 7 years ago015: Energy Independence, Mind Control, Methods Of Manipulation, ObfuscationTopics Energy Independence, Mind Control, Methods Of Manipulation, Obfuscation, Simplicity vs. Complexity, Principles vs. law 2010-07-06 Listen to the Podcastlancine (25)in private • 7 years agosteemCreated with Sketch.Cryptocurrencies, privacy and obfuscation - In a nutshellA common misconception about Bitcoin is that it is private. But the public ledger allows anyone to look at all the historical transactions. Although your name is nowhere to be found in the public…chrisost (27)in pcds • 7 years ago[Malware] We have an Engine.Many people get infected automatically as soon as they visit the normal website. This is because it hacked websites and hid unusual links through administrator rights. when a website is loaded…electropig (54)in net • 7 years agoMILO on Net NeutralityEveryone knows that the net was meant to be uncontrolled by any outside, or third parties...that's HOW it got to the point it is today. So let's consider the idea of keeping OUR EMPLOYEES the hell…tai-euler (51)in nullcon • 7 years agoHack like a Pro! Invoke Obfuscation (nullcon 2017)he very best attackers hide their commands from A/V and application whitelisting technologies using encoded commands and memory-only payloads to evade detection. These techniques thwart Blue Teams…