# Cipher ## Description Using encryption or cipher techniques to encode malicious content ## Attack Examples - Using simple substitution ciphers - Implementing Caesar cipher variants - Using Vigenère cipher encoding - Creating custom encryption schemes - Using polyalphabetic substitution - Implementing ROT13 variations - Using book ciphers - Creating transposition ciphers - Combining multiple cipher techniques