Mobile phone typing is really troublesome, so I will not directly provide instances for some simple or too complex code.
1. Not a method-add comments
Add unnecessary comments without signature. Code omitted
2. case-insensitive Mixing
Ignore case sensitivity using VBS
3. Mixing branches and peers
Use the colon (:) to connect multiple lines of code as one line
4. One row is divided into multiple rows
Use the hyphen (_) to write a row into multiple rows.
5. execute Functions
Copy codeThe Code is as follows: Execute ("createobject (" & chr (34) & "wscript. shell" & chr (34) & chr (41) & ". popup now ")
6. string segmentation and mixing of & yu + connections
Copy codeThe code is as follows: code = "creat" + "eobject (" & chr (34) + "wscr" & "ept. she "&" ll "+ chr (34) & chr (41) + ". popup now, 5"
Execute code
7. encryption and decryption between Excape and Unescape
Copy codeCode: Createobject (unescape ("% 57% 53% 43% 52% 49% 50% 54% 2E % 53% 48% 45% 4C % 4C "))
Ws. popup now, 5
8. Execute the converted decimal ASCII
9. Execute the converted hexadecimal ASCII
Search using the keyword "VBS encryption tool" to find the software that provides the above two encryption methods. However, you do not need this software now. You can find VBS that can perfectly implement these two encryption methods in the current space.
10. Use custom functions to replace internal functions (encapsulate internal functions)Copy codeThe Code is as follows: Function t ()
T = now ()
End function
Msgbox t
11. Plus-() & and other characters plus spaces on both sides
12. The variable name is automatically changed. Copy codeThe Code is as follows: RANDOMIZE
Set FSO = createobject ("scripting. filesystemobject ")
MF = FSO. opentextfile (wscript. scriptfullname, 1). readall
ARY = array ("FSO", "MF", "ARY", "NUM ")
For NUM = 0 to 3
MF = REPLACE (MF, ARY (NUM), chr (fix (rnd * 25) + 65) & chr (fix (rnd * 25) + 65) & chr (fix (rnd * 25) + 65) & chr (fix (rnd * 25) + 65 ))
Next
FSO. opentextfile (wscript. scriptfullname, 2, 1). write MF
Run the preceding code and open the VBS file. You can find that the variable has changed.
13. shelling
The previous method only changes variables. This method disrupts all code and changes each time.
This code is the most complex. You can search for "WINDOWS Script technology" on the Internet (preferably 51jb.net ). You can find this encryption method in this file. You can learn a lot through this article.
14. Use official encryption tools
Screnc.exe
My space also has a previous Introduction
You may think that I have done so many methods just to make up the data. Indeed, many of my methods are meaningless. However, there are far more VBS encryption methods. I have seen several very powerful encryption algorithms before, but I didn't understand them at the time. Now I forget that you can search for them online.