# obfuscation
標記為「obfuscation」的 26 篇文章
Skill Verification: Encoding and Obfuscation
Skill verification for Base64, Unicode, token smuggling, and encoding-based bypass techniques.
AI Code Review Manipulation
Techniques for tricking AI-powered code review tools into approving vulnerable code — covering semantic obfuscation, review bias exploitation, and defense strategies.
Community Challenge: Encoding Puzzle
Decode a series of encoded payloads to find hidden flags, testing knowledge of encoding schemes, obfuscation techniques, and payload analysis.
Encoding and Obfuscation Basics
Explore how Base64, ROT13, and Unicode encoding can bypass input filters in LLM applications.
Lab: Encoding & Obfuscation Techniques
Hands-on lab exploring how text encoding, character substitution, and obfuscation methods can bypass LLM content filters and safety mechanisms.
Lab: Encoding Bypass Lab
Hands-on lab for systematically testing Base64, ROT13, Unicode homoglyph, hexadecimal, and combined encoding bypasses against LLM safety filters with measured success rates.
Lab: Encoding Evasion Techniques
Hands-on lab using Base64, ROT13, Unicode normalization, and custom encoding schemes to evade input filters and safety classifiers in language model systems.
Advanced Encoding Chain Attacks (Prompt Injection)
Deep dive into chaining multiple encoding schemes to create injection payloads that bypass layered input filters and content classifiers.
Encoding Bypass Techniques
Using Base64, ROT13, Unicode transformations, hex encoding, and other obfuscation methods to evade prompt injection filters and safety classifiers while preserving semantic meaning.
Advanced Payload Obfuscation
Advanced obfuscation techniques for prompt injection payloads including encoding chains and semantic disguise.
Unicode and Homoglyph Injection
Leveraging Unicode normalization inconsistencies, homoglyph substitution, and invisible characters to construct stealthy injection payloads.
Cipher-Based Jailbreak
Using ciphers, encodings, and coded language to bypass LLM content filters by transforming harmful requests into formats that safety classifiers do not recognize.
Payload Obfuscation Techniques
Methods for disguising prompt injection payloads through encoding, splitting, substitution, and other obfuscation techniques to bypass input filters and detection systems.
Skill Verification: Encoding and Obfuscation
Skill verification for Base64, Unicode, token smuggling, and encoding-based bypass techniques.
AI 程式碼審查操控
欺騙 AI 驅動程式碼審查工具核准脆弱程式碼的技術——涵蓋語意混淆、審查偏誤利用與防禦策略。
Community Challenge: Encoding Puzzle
Decode a series of encoded payloads to find hidden flags, testing knowledge of encoding schemes, obfuscation techniques, and payload analysis.
Encoding and Obfuscation Basics
Explore how Base64, ROT13, and Unicode encoding can bypass input filters in LLM applications.
實驗室: Encoding & Obfuscation Techniques
Hands-on lab exploring how text encoding, character substitution, and obfuscation methods can bypass LLM content filters and safety mechanisms.
實驗室: Encoding Bypass 實驗室
Hands-on lab for systematically testing Base64, ROT13, Unicode homoglyph, hexadecimal, and combined encoding bypasses against LLM safety filters with measured success rates.
實驗室: Encoding Evasion Techniques
Hands-on lab using Base64, ROT13, Unicode normalization, and custom encoding schemes to evade input filters and safety classifiers in language model systems.
進階 Encoding Chain 攻擊s (提示詞注入)
Deep dive into chaining multiple encoding schemes to create injection payloads that bypass layered input filters and content classifiers.
Encoding Bypass Techniques
Using Base64, ROT13, Unicode transformations, hex encoding, and other obfuscation methods to evade prompt injection filters and safety classifiers while preserving semantic meaning.
進階 Payload Obfuscation
進階 obfuscation techniques for prompt injection payloads including encoding chains and semantic disguise.
Unicode and Homoglyph Injection
Leveraging Unicode normalization inconsistencies, homoglyph substitution, and invisible characters to construct stealthy injection payloads.
Cipher-Based 越獄
Using ciphers, encodings, and coded language to bypass LLM content filters by transforming harmful requests into formats that safety classifiers do not recognize.
Payload Obfuscation Techniques
Methods for disguising prompt injection payloads through encoding, splitting, substitution, and other obfuscation techniques to bypass input filters and detection systems.