Skip to content

Instantly share code, notes, and snippets.

Forked from Neo23x0/
Created November 20, 2019 15:46
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
Star You must be signed in to star a gist
What would you like to do?
Learning Aid - Top Base64 Encodings Table

Learning Aid - Top Base64 Encodings Table

MITRE ATT4CK - T1132 - Data Encoding

Base64 Code Mnemonic Aid Decoded* Description
JAB 🗣 Jabber $. Variable declaration (UTF-16)
TVq 📺 Television MZ MZ header
UEs 🏬 Upper East Side PK ZIP, Office documents
SUVY 🚙 SUV IEX PowerShell Invoke Expression
SQBFAF 🐣 Squab favorite I.E. PowerShell Invoke Expression (UTF-16)
PAA 💪 "Pah!" <. Often used by Emotet (UTF-16)
cwBhA 🦁 Chewbaka s.a. Often used in malicious droppers (UTF-16) 'sal' instead of 'var'
aWV4 Awe version 4 iex PowerShell Invoke Expression
aQBlA 💦 Aqua Blah (aquaplaning) i.e. PowerShell Invoke Expression (UTF-16)
R2V0 🤖 R2D2 but version 0 Get Often used to obfuscate imports like GetCurrentThreadId
dmFy 👹 defy / demonify var Variable declaration
dgBhA debugger + high availability v.a. Variable declaration (UTF-16)
dXNpbm Dixon problem usin Often found in compile after delivery attacks
H4sIA 🚁 HForce (Helicopter Force) I agree gzip magic bytes (0x1f8b), e.g. echo 'test' | gzip -cf | base64

* the . stands for 0x00

Cyber Chef Recipe'%5C%5Cn','%5C%5Cn',false)From_Base64('A-Za-z0-9%2B/%3D',true)&input=SkFCClRWcQpQQUEKU1VWWQpTUUJGQUYKYVdWNAphUUJsQQpSMlYwCmRtRnkKZGdCaEEKY3dCaEEKZFhOcGJtCkg0c0lBRldXc2wwQUF5dEpMUzdoQWdER05iazdCUUFBQUE9PQ



Tweet and Thread



Emotet process command line




Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment