# encoding
26 articlestagged with “encoding”
Steganographic Attack Assessment
Assessment of hidden payload delivery through steganography, zero-width characters, and encoding tricks.
Skill Verification: Encoding and Obfuscation
Skill verification for Base64, Unicode, token smuggling, and encoding-based bypass techniques.
Community Challenge: Encoding Puzzle
Decode a series of encoded payloads to find hidden flags, testing knowledge of encoding schemes, obfuscation techniques, and payload analysis.
Weekly Challenge: Encoding Gauntlet
A weekly challenge series focused on bypassing increasingly sophisticated encoding-based defenses through creative payload construction.
Tokenization & Its Security Implications
How BPE and SentencePiece tokenizers work, and how tokenizer behavior creates exploitable attack surfaces including boundary attacks, homoglyphs, and encoding tricks.
Tokenization and Its Security Implications
How tokenization works and why it creates security-relevant behaviors in language models.
Tokenizer Security
How tokenization creates attack surfaces in LLM systems: BPE exploitation, token boundary attacks, encoding edge cases, and tokenizer-aware adversarial techniques.
Encoding and Obfuscation Basics
Explore how Base64, ROT13, and Unicode encoding can bypass input filters in LLM applications.
Lab: Encoding & Obfuscation Techniques
Hands-on lab exploring how text encoding, character substitution, and obfuscation methods can bypass LLM content filters and safety mechanisms.
Lab: Encoding Bypasses
Test Base64, ROT13, hex, and Unicode encoding techniques to evade LLM content filters while preserving the semantic meaning of adversarial payloads.
Character Encoding Bypass Techniques
Bypass input filters using Unicode normalization, homoglyph substitution, and mixed-script encoding.
Encoding Maestro Challenge
Solve 10 encoding puzzles that require creative use of Base64, Unicode, ROT13, and custom encodings to bypass filters.
Invisible Ink: Hidden Payload Extraction Challenge
Extract a hidden flag by decoding multiple layers of obfuscation in model responses across encoded channels.
Advanced Encoding Chain Attacks
Chain multiple encoding schemes to bypass multi-layer input filters in production LLM applications.
Lab: Encoding Bypass Lab
Hands-on lab for systematically testing Base64, ROT13, Unicode homoglyph, hexadecimal, and combined encoding bypasses against LLM safety filters with measured success rates.
Lab: Encoding Evasion Techniques
Hands-on lab using Base64, ROT13, Unicode normalization, and custom encoding schemes to evade input filters and safety classifiers in language model systems.
Lab: Token Smuggling & Encoding Bypass
Hands-on lab exploring how tokenization boundaries, token-level manipulations, and encoding tricks can smuggle attack payloads past safety classifiers.
Output Filter Bypass via Encoding
Bypass output safety filters by instructing the model to encode responses in Base64, hex, or custom schemes.
Advanced Encoding Chain Attacks (Prompt Injection)
Deep dive into chaining multiple encoding schemes to create injection payloads that bypass layered input filters and content classifiers.
Encoding Bypass Techniques
Using Base64, ROT13, Unicode transformations, hex encoding, and other obfuscation methods to evade prompt injection filters and safety classifiers while preserving semantic meaning.
Cipher-Based Jailbreak
Using ciphers, encodings, and coded language to bypass LLM content filters by transforming harmful requests into formats that safety classifiers do not recognize.
Encoding-Based Evasion
Using base64, ROT13, hexadecimal, Unicode, and other encoding schemes to evade input detection systems and bypass content filters in LLM applications.
Encoding Chain Attack Walkthrough
Chain multiple encoding transformations to bypass input filters that only decode one layer of encoding.
Encoding Chain Bypass Walkthrough
Walkthrough of chaining Base64, URL encoding, and Unicode tricks to bypass multi-layer input filters.
QR Code Injection
Using QR codes as prompt injection vectors against vision-language models, encoding adversarial instructions in machine-readable formats that models decode and follow.
Unicode Normalization Defense
Step-by-step walkthrough for implementing Unicode normalization to prevent encoding-based prompt injection bypasses, covering homoglyph detection, invisible character stripping, bidirectional text handling, and normalization testing.