javascript-obfuscator
CyberChef
javascript-obfuscator | CyberChef | |
---|---|---|
45 | 286 | |
12,790 | 25,649 | |
1.4% | 2.5% | |
4.0 | 9.3 | |
14 days ago | 5 days ago | |
TypeScript | JavaScript | |
BSD 2-clause "Simplified" License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
javascript-obfuscator
-
Need ideas with modding TCOAAL
I don't need/use IDA, Nemlei just used https://obfuscator.io/, which just obfuscates the crap out of the code using various known methods (which I won't go into detail, it's public knowledge) and an un-obfuscation was cooked up by others. The one fucked-up thing the website does is randomizing function names, it just changes every variable/function name. We can't "un-obfuscate" those, so it's up to our brains to figure out what the code does, and change the names back.
- Javascript Deobfuscation
-
Question about backticks
I was considering using a obfuscation library (https://github.com/javascript-obfuscator/javascript-obfuscator) and noticed in the usage example that backticks are used and the javascript is enclosed within. The issue is that my javascript already has backticks from using template literals so my code then errors out.
-
How To Secure Your JavaScript Applications
Obfuscation: JavaScript Obfuscator
- my friend showed me his code, thees are all functions
-
Which options do I have to hide/obfuscate/bytecode my main source code but not the renderer? Angular inside.
What I ended up doing is having two build steps, one for renderer and other for the main process, in the main process build I use https://github.com/javascript-obfuscator/javascript-obfuscator. Works pretty fine.
- Whats going on in this HTML JS phishing attempt
-
How do human read code like this
It's to purposefully makes your code harder to read so it prevents people from stealing your work. Here's a tool that does it: https://obfuscator.io/
-
TIL you can de-obfuscate code with ChatGPT
I just tested it on a little snippet of my code obfuscated with https://obfuscator.io/ and it worked seemingly perfectly.
My original code:
function resizeImage(img) {
-
Reverse Engineering TikTok's VM Obfuscation (Part 2)
https://obfuscator.io/ produces a similar result, perhaps that's all they used.
CyberChef
-
PicoCTF 2024: packer
Then we take the encrypted text and use CyberChef to decrypt it.
-
Unbreakable 2024: secrets-of-winter
Let's go to CyberChef and insert our pieces of evidence.
-
YouTube: Google has found a way to break Invidious
A parameter was changed from '2AMBCgIQBg' to 'CgIIAdgDAQ%3D%3D' which is just the correct base64 encoding they should have been using the entire time.
I don't think this was a hostile action by Google, I think someone just added better input validation for security reasons and it accidently broke the bad requests they were sending.
https://gchq.github.io/CyberChef/#recipe=URL_Decode()From_Ba...
-
PicoCTF 2024- CanYouSee
❗This is indeed the flag, but the text is encrypted with Base64. Usually, the presence of padding character "=" indicates that's Base64 type of encoding (but that's only one of the hints). To decrypt it, we can use CyberChef. Copy-paste the text and we either:
-
CyberChef VS DevToolboxWeb - a user suggested alternative
2 projects | 6 Feb 2024
-
CyberChef from GCHQ: The Cyber Swiss Army Knife
It uses a combination of magic bytes (like the `file` command), entropy analysis and character frequency detection to determine whether an output is likely to be of interest to the user.
The file type mechanism is written here[0]. There's a list of all signatures we detect here[1].
[0] https://github.com/gchq/CyberChef/blob/master/src/core/lib/F...
- Show HN: File Hider
- UK GCHQ's CyberChef
-
Lets try this again. Got a code for you to break.
I think this can be deciphered using CyberChef...
- CyberChef is a useful tool for decoding information.
What are some alternatives?
HaikunatorJS - Generate Heroku-like random names to use in your node applications.
QR-Code-generator - High-quality QR Code generator library in Java, TypeScript/JavaScript, Python, Rust, C++, C.
rollup-plugin-obfuscator - Rollup plugin for javascript-obfuscator
CapRover - Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids
jsfuck - Write any JavaScript with 6 Characters: []()!+
py4e - Web site for www.py4e.com and source to the Python 3.0 textbook
docx - Easily generate and modify .docx files with JS/TS with a nice declarative API. Works for Node and on the Browser.
cyberchef-recipes - A list of cyber-chef recipes and curated links
url-pattern - easier than regex string matching patterns for urls and other strings. turn strings into data or data into strings.
Ciphey - ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
rollup-plugin-ts - A TypeScript Rollup plugin that bundles declarations, respects Browserslists, and enables seamless integration with transpilers such as babel and swc
Monica - Personal CRM. Remember everything about your friends, family and business relationships.