Most of the time, attackers use very simple encoding algorithms such as Base64 encoding or xor encryption to obscure the data. The reason why attackers use simple algorithms is because they are easy to implement, takes fewer system resources, and are just enough to obscure the content from the security products and the security analyst.