All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
linkedin.com
XOR Obfuscation: A Lightweight Evasion Technique | Josh Stroschein posted on the topic | LinkedIn
🧠 Why is a simple bitwise operation still a favorite for malware authors? XOR has a unique mathematical property: it is its own inverse. Because (Data XOR Key) XOR Key = Data, the same logic used to scramble a string is used to recover it. This makes it the ultimate lightweight tool for obfuscation. With just a single-byte key (or multi-byte ...
19.8K views
1 month ago
Obfuscation Techniques
0:56
A question of security: What is obfuscation and how does it work?
zdnet.com
Aug 10, 2018
5:30
SOC Experts - Anand Guru - Malware Analysis - 10 Obfuscation techniques
YouTube
SOC Experts
10.2K views
Sep 3, 2021
3:57
1.4 - Obfuscation: Steganography, Tokenization, Masking (CompTIA Security+ SY0-701)
YouTube
CyberMuk
615 views
Jul 23, 2024
Top videos
47:42
Cryptographic Program Obfuscation: Current Capabilities and Challenges
Microsoft
May 1, 2018
How does security Obfuscation work? | Security Encyclopedia
hypr.com
Aug 23, 2022
Applications of Obfuscation I
berkeley.edu
May 20, 2015
Obfuscation Examples
2:25
What is obfuscation and how does it work? | Definition from TechTarget
techtarget.com
Aug 24, 2021
The Best Social Media Marketing Examples for 2025
meltwater.com
Nov 13, 2020
1:10
Norman Finklestein, The Obfuscation Defender Of Murder, Sexual Abuse In Iran And Israel
YouTube
Steve Brownstein
5 days ago
47:42
Cryptographic Program Obfuscation: Current Capabilities
…
May 1, 2018
Microsoft
How does security Obfuscation work? | Security Encyclopedia
Aug 23, 2022
hypr.com
Applications of Obfuscation I
May 20, 2015
berkeley.edu
What Is Code Obfuscation?
Mar 3, 2025
preemptive.com
Obfuscation Vs. Encryption (Easily Explained)
Apr 27, 2022
cybersynchs.com
Mastering Advanced Python : Obfuscation Techniques
Jun 9, 2023
git.ir
2:25
What is obfuscation and how does it work? | Definition from TechTarget
Aug 24, 2021
techtarget.com
0:56
A question of security: What is obfuscation and how does it work?
Aug 10, 2018
zdnet.com
Limits of Obfuscation
Oct 31, 2009
Microsoft
Obfuscation du logiciel : brouiller le code pour protéger les programmes
Jul 5, 2021
college-de-france.fr
0:16
🐾Powershell Obfuscator 🐾 This program is designed to obfuscate
…
10.4K views
Mar 25, 2025
Facebook
National Cyber Security Services
3:58
🤯Cracked: How to REMOVE OBFUSCATION from ANY Dump i
…
464 views
1 month ago
YouTube
Leon4ikmods v2
ObfusQate: Unveiling the First Quantum Program Obfuscation Fr
…
1 month ago
acm.org
1:40
Obfuscation Explained | NordVPN
113.3K views
Sep 7, 2018
YouTube
NordVPN
16:37
C# Tutorial - Obfuscator | FoxLearn
42.8K views
Jun 17, 2015
YouTube
Fox Learn
10:46
Java objects (OOP) ☕
296.8K views
Sep 29, 2020
YouTube
Bro Code
13:20
Exception Handling in Java Tutorial
562.8K views
Dec 31, 2020
YouTube
Coding with John
2:14
What is Obfuscation?
21.8K views
Aug 4, 2021
YouTube
Eye on Tech
31:52
Java - Decompile (JD-GUI) and Obfuscate (Proguard) Exploration
13.5K views
Apr 5, 2020
YouTube
MoosesValley
14:49
Obfuscate PowerShell script using Invoke-Obfuscation!
14.8K views
Jun 6, 2021
YouTube
ActiveXSploit
6:45
Obfuscating Python Code with GPT-3
21K views
Jan 3, 2021
YouTube
Bakz T. Future
8:24
JavaScript Deobfuscation explained for beginners
8.1K views
May 20, 2021
YouTube
what0fthew0rts
3:52
How to Obfuscate Your JavaScript Source Code
14.9K views
Nov 17, 2020
YouTube
PreEmptive
3:56
How To Obfuscate any roblox script
5K views
Jul 21, 2020
YouTube
Fish Exploits
14:07
Object-Oriented Programming Java Tutorial (Java OOP) #71
600.9K views
Aug 22, 2019
YouTube
Alex Lee
38:20
Introduction To Cyber Security | Cyber Security Training For Begin
…
1.8M views
Aug 2, 2019
YouTube
Simplilearn
11:07
Java Exceptions - Learn Exceptions in Java #43
236.2K views
Apr 4, 2019
YouTube
Alex Lee
8:21:09
Cyber Security Full Course In 8 Hours | Cyber Security Training F
…
503.4K views
Feb 9, 2021
YouTube
edureka!
12:21
Github Actions CI/CD - Everything you need to know to get started
392.8K views
Mar 12, 2021
YouTube
DevOps Journey
See more videos
More like this
Feedback