Search Evasion Techniques

Names, Techniques, Definitions, Keywords

Search Result

1 item(s) found so far for this keyword.

XOR Operation Data Obfuscation

The XOR operation is the most common use by malware. This is because it is really easy to use for hiding data. Basically a key is used and create the cipher text. XOR is a reversible function that means it uses the same function to encode and decode.

Read More