Set of algorithms which can be used as a library to obfuscate malware communication traffic and therefore bypass EDR and other defensive capabilities.
- JSON: ToJSON, FromJSON
- CSV: ToCSV, FromCSV
- Numbers: ToNumbers, FromNumbers
| Name | Name | Last commit date | ||
|---|---|---|---|---|