PolyFull
javascript-obfuscator
Our great sponsors
PolyFull | javascript-obfuscator | |
---|---|---|
1 | 45 | |
24 | 12,617 | |
- | 2.3% | |
0.0 | 5.5 | |
over 2 years ago | 5 months ago | |
TypeScript | TypeScript | |
MIT License | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
PolyFull
We haven't tracked posts mentioning PolyFull yet.
Tracking mentions began in Dec 2020.
javascript-obfuscator
-
How To Secure Your JavaScript Applications
Obfuscation: JavaScript Obfuscator
- my friend showed me his code, thees are all functions
-
Which options do I have to hide/obfuscate/bytecode my main source code but not the renderer? Angular inside.
What I ended up doing is having two build steps, one for renderer and other for the main process, in the main process build I use https://github.com/javascript-obfuscator/javascript-obfuscator. Works pretty fine.
- Whats going on in this HTML JS phishing attempt
-
How do human read code like this
It's to purposefully makes your code harder to read so it prevents people from stealing your work. Here's a tool that does it: https://obfuscator.io/
-
TIL you can de-obfuscate code with ChatGPT
I just tested it on a little snippet of my code obfuscated with https://obfuscator.io/ and it worked seemingly perfectly.
My original code:
function resizeImage(img) {
-
Reverse Engineering TikTok's VM Obfuscation (Part 2)
https://obfuscator.io/ produces a similar result, perhaps that's all they used.
-
How can I deobfuscate this?
- I payed a guy to make me a discord bot and he sent back the source and one of the files were obfuscated. I tracked back the obfuscation to https://obfuscator.io/ and asked if someone can un-obfuscate it
Some parts of the code are not obfuscated, and the others parts are obfuscated using: https://obfuscator.io/
- Reverse Engineering TikTok's VM Obfuscation (Part 1)
What are some alternatives?
HaikunatorJS - Generate Heroku-like random names to use in your node applications.
rollup-plugin-obfuscator - Rollup plugin for javascript-obfuscator
jsfuck - Write any JavaScript with 6 Characters: []()!+
docx - Easily generate and modify .docx files with JS/TS with a nice declarative API. Works for Node and on the Browser.
url-pattern - easier than regex string matching patterns for urls and other strings. turn strings into data or data into strings.
rollup-plugin-ts - A TypeScript Rollup plugin that bundles declarations, respects Browserslists, and enables seamless integration with transpilers such as babel and swc
helmet - Help secure Express apps with various HTTP headers
kill-switch - A small bit of javascript to kill a website should the need arise
browser - The browser that fights for your privacy.
Ditox.js - Dependency injection for modular web applications
Lombok - Very spicy additions to the Java programming language.
Skater-.NET-Obfuscator - Skater .NET Obfuscator is an obfuscation tool for .NET code protection. It implements all known software protection techniques and obfuscation algorithms.