Tagged articles
7 articles
Page 1 of 1
Black & White Path
Black & White Path
Mar 14, 2026 · Information Security

Godzilla Reflection AES Plugin with Data‑Flow Break: A Webshell Generator that Evades Detection

The article introduces VeilShell, a Godzilla‑based reflection AES encryptor combined with a Data‑Flow Break and dynamic callback technique to generate PHP webshells, presents detailed evasion test results against Changting, Alibaba and VirusTotal scanners, and provides performance metrics and a GitHub link for acquisition.

AES encryptionData-Flow BreakDetection Evasion
0 likes · 3 min read
Godzilla Reflection AES Plugin with Data‑Flow Break: A Webshell Generator that Evades Detection
DevOps Cloud Academy
DevOps Cloud Academy
Mar 24, 2025 · Information Security

Protecting Sensitive Configuration Files: .gitignore, Environment Variables, Secret Management, and AES Encryption with Python

This article explains how to safeguard sensitive configuration data such as database credentials and API keys by using .gitignore, environment variables, secret management tools, and AES encryption with a Python script, and describes how to integrate these practices into CI/CD pipelines.

AES encryptionConfiguration ManagementDevOps
0 likes · 7 min read
Protecting Sensitive Configuration Files: .gitignore, Environment Variables, Secret Management, and AES Encryption with Python
ITPUB
ITPUB
Jul 28, 2024 · Mobile Development

Why Do WebP Photos Corrupt on Android? A Deep Dive into AES Encryption Bugs

An Android app that stores shop‑sign photos began corrupting WebP images at a stable 1/200 rate, leading to a thorough investigation of the storage module, AES encryption implementation, and thread safety, ultimately uncovering a faulty string‑length check that broke binary image handling.

AES encryptionAndroidImage Corruption
0 likes · 16 min read
Why Do WebP Photos Corrupt on Android? A Deep Dive into AES Encryption Bugs
Youku Technology
Youku Technology
Sep 10, 2020 · Fundamentals

ZIP Streaming Decompression: Technical Principles and Implementation

The article explains Alibaba Youku’s picture‑book team’s streaming ZIP decompression technique that bypasses the end‑of‑file central directory by using each entry’s local file header, supports PKWARE and AES‑encrypted archives, and achieves up to 100 % faster extraction, reducing a 30 MB file’s load time to under one second.

AES encryptionCentral DirectoryFile Compression
0 likes · 9 min read
ZIP Streaming Decompression: Technical Principles and Implementation
Programmer DD
Programmer DD
Jun 10, 2018 · Information Security

How to Secure API Calls with End-to-End Encryption in Spring Boot and JavaScript

This guide explains practical methods to protect API data, covering HTTPS, request signing, SSL pinning, symmetric and asymmetric encryption, a Spring Boot starter for automatic request/response encryption, and JavaScript/Axios interceptors for client‑side encryption and decryption.

AES encryptionAPI SecurityHTTPS
0 likes · 11 min read
How to Secure API Calls with End-to-End Encryption in Spring Boot and JavaScript
Senior Brother's Insights
Senior Brother's Insights
Jun 8, 2018 · Information Security

Secure API Calls with Spring Boot Starter Encrypt and JavaScript AES

This article explains how to protect data exchanged between front‑end and back‑end services by using HTTPS, request signing, SSL pinning, and a Spring Boot starter that transparently encrypts/decrypts all API traffic with AES, complemented by JavaScript AES utilities and Axios interceptors for front‑end encryption.

AES encryptionAPI SecurityBlockchain
0 likes · 11 min read
Secure API Calls with Spring Boot Starter Encrypt and JavaScript AES
Tencent Cloud Developer
Tencent Cloud Developer
Mar 22, 2018 · Mobile Development

Evolution of App Communication: From JSON Text Protocol to Binary JCE Protocol in the XinYue Club App

The XinYue Club App migrated from an HTTP + JSON text protocol to a compact, AES‑GCM‑encrypted binary JCE protocol, detailing header/body structures, compression, signature validation, and security measures, while comparing the readability and debugging ease of JSON against the performance and protection benefits of binary communication.

AES encryptionJSONbinary protocol
0 likes · 12 min read
Evolution of App Communication: From JSON Text Protocol to Binary JCE Protocol in the XinYue Club App