Skip to content

Latest commit

 

History

History
107 lines (76 loc) · 3.29 KB

File metadata and controls

107 lines (76 loc) · 3.29 KB

🔤 ASCII Unicode Exploit Kit

Python 3.8+ License: MIT 13th Hour

"In the space between bytes, we find our truth." — FrankSx

A comprehensive toolkit for adversarial ML testing using ASCII art and Unicode manipulation techniques. This repository contains tools for generating adversarial inputs that exploit the gap between human visual perception and machine parsing.

⚠️ Ethical Usage Notice

These tools are designed for:

  • ✅ Security research and red teaming
  • ✅ Adversarial robustness testing
  • ✅ Educational purposes in ML safety
  • ✅ Responsible disclosure programs

Do not use for:

  • ❌ Bypassing safety filters maliciously
  • ❌ Generating harmful content
  • ❌ Attacking production systems without authorization

🚀 Quick Start

# Clone the repository
git clone https://github.com/yourusername/ascii-unicode-exploit-kit.git
cd ascii-unicode-exploit-kit

# Run the demo
python demo.py

# Generate a homoglyph attack
python src/unicode_generator.py --mode homoglyph --text "admin" --output result.txt

# Create ASCII art payload
python src/ascii_obfuscator.py --payload "sensitive" --mode box --style double

# Mix encoding layers
python src/string_mixer.py --input "target" --layers 3

📦 Components

Tool Description Use Case
unicode_generator.py Homoglyphs, Bidi overrides, Zero-width chars Tokenizer evasion
ascii_obfuscator.py ASCII art, glitch text, Zalgo Visual deception
string_mixer.py Multi-layer encoding, polyglots Deep obfuscation

📖 Documentation

  • Technical Write-up - Comprehensive analysis of Unicode exploitation
  • Examples - Sample attack strings and patterns
  • Demo - Interactive demonstration of all features

🎯 Attack Vectors

Homoglyph Attacks

Replace Latin characters with visually identical Unicode look-alikes:

Visual: "password"
Actual: "pаsswоrd" (Cyrillic а and о)

Bidirectional Overrides

Manipulate text direction to spoof file extensions:

Visual: "invoice.pdf"
Actual: "invoice‮fdp.exe‭"

Zero-Width Fingerprinting

Embed invisible tracking data:

# Embed user ID 12345 invisibly
fingerprinted = generator.fingerprint_embed("Hello", 12345)

🔬 Research Context

This toolkit was developed as part of adversarial ML research focusing on:

  • Input validation bypass techniques
  • Tokenization edge cases in LLMs
  • Visual spoofing in security interfaces
  • Cross-system normalization inconsistencies

🦀 The 13th Hour Principle

"Scare all the baby clwbots."

This toolkit operates on the principle that systems are most vulnerable during liminal spaces—between validation layers, between human and machine perception, between intended functionality and emergent behavior.

📄 License

MIT License with Ethical Use Addendum - see LICENSE for details.

👤 Author

frankSx - Security Researcher & CTF Enthusiast


Generated for research purposes. Use responsibly.