Hiding executables and obfuscating the attacker's URL