javascript-obfuscator
blocklist-ipsets
javascript-obfuscator | blocklist-ipsets | |
---|---|---|
45 | 39 | |
12,790 | 2,951 | |
1.4% | 1.4% | |
4.0 | 2.7 | |
14 days ago | 4 days ago | |
TypeScript | Shell | |
BSD 2-clause "Simplified" License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
javascript-obfuscator
-
Need ideas with modding TCOAAL
I don't need/use IDA, Nemlei just used https://obfuscator.io/, which just obfuscates the crap out of the code using various known methods (which I won't go into detail, it's public knowledge) and an un-obfuscation was cooked up by others. The one fucked-up thing the website does is randomizing function names, it just changes every variable/function name. We can't "un-obfuscate" those, so it's up to our brains to figure out what the code does, and change the names back.
- Javascript Deobfuscation
-
Question about backticks
I was considering using a obfuscation library (https://github.com/javascript-obfuscator/javascript-obfuscator) and noticed in the usage example that backticks are used and the javascript is enclosed within. The issue is that my javascript already has backticks from using template literals so my code then errors out.
-
How To Secure Your JavaScript Applications
Obfuscation: JavaScript Obfuscator
- my friend showed me his code, thees are all functions
-
Which options do I have to hide/obfuscate/bytecode my main source code but not the renderer? Angular inside.
What I ended up doing is having two build steps, one for renderer and other for the main process, in the main process build I use https://github.com/javascript-obfuscator/javascript-obfuscator. Works pretty fine.
- Whats going on in this HTML JS phishing attempt
-
How do human read code like this
It's to purposefully makes your code harder to read so it prevents people from stealing your work. Here's a tool that does it: https://obfuscator.io/
-
TIL you can de-obfuscate code with ChatGPT
I just tested it on a little snippet of my code obfuscated with https://obfuscator.io/ and it worked seemingly perfectly.
My original code:
function resizeImage(img) {
-
Reverse Engineering TikTok's VM Obfuscation (Part 2)
https://obfuscator.io/ produces a similar result, perhaps that's all they used.
blocklist-ipsets
- [Opnsensefirewall] Bloquer des IP malveillants avec un pare-feu OPNSENSE
-
Firewall Rules for a recently probed newbie?
Look into FireHol and its use of IPsets: https://firehol.org/guides/ipset/ | http://iplists.firehol.org/ - you can easily do what you’re wanting with these two.
- IPlist of bots/malicious actors
- Ask HN: What are these strange random strings spamming my blog?
-
A good malware/threat filtering choice on OPNSense
Yes, unfortunately i think this also happened other times with Firehol L3 (you can see https://github.com/firehol/blocklist-ipsets/issues/188) but thanks for the lists advice.
-
Creating a cyber threat intelligence tool
It sounds like you want to jump into game development before learning how to write "Hello, world!". Try using any of the open source tools that already do this and sign up for some "free" threat intel tools and learn the lay of the land. https://www.misp-project.org/ https://github.com/OpenCTI-Platform/opencti https://iplists.firehol.org/ https://www.greynoise.io/
-
Did anyone notice an abnormal increase in banned clients? These are my daily fail2ban ban count
I believe you are running SSH over default port 22 - feel free to change that. You can also use iplists from FireHOL to block any connection from blacklisted (on way or another) IPs - https://iplists.firehol.org/
- External Dynamic lists
-
blocklist-ipsets VS Lists - a user suggested alternative
2 projects | 19 Jan 2023
-
Show HN: A Golang package and tool to detect Tor exit IP addresses
Tor exits are tracked here [1] and in a few other block-list repos. The data is built from Tor's exit node list [2]
[1] - https://github.com/firehol/blocklist-ipsets
[2] - https://check.torproject.org/exit-addresses
What are some alternatives?
HaikunatorJS - Generate Heroku-like random names to use in your node applications.
nginx-ultimate-bad-bot-blocker - Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
rollup-plugin-obfuscator - Rollup plugin for javascript-obfuscator
firehol - A firewall for humans...
jsfuck - Write any JavaScript with 6 Characters: []()!+
crowdsec - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
docx - Easily generate and modify .docx files with JS/TS with a nice declarative API. Works for Node and on the Browser.
my-pihole-blocklists - Create custom pi-hole blocklists
url-pattern - easier than regex string matching patterns for urls and other strings. turn strings into data or data into strings.
ipsum - Daily feed of bad IPs (with blacklist hit scores)
rollup-plugin-ts - A TypeScript Rollup plugin that bundles declarations, respects Browserslists, and enables seamless integration with transpilers such as babel and swc
block - Let's make an annoyance free, better open internet, altogether!