metlo
javascript-obfuscator
Our great sponsors
metlo | javascript-obfuscator | |
---|---|---|
21 | 45 | |
1,566 | 12,704 | |
1.3% | 1.9% | |
7.2 | 5.5 | |
about 2 months ago | 5 months ago | |
TypeScript | TypeScript | |
MIT License | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
metlo
-
Using Metlo to Secure My Personal Finance App
So far, I’ve been using Metlo's protection features to initially test out its capabilities on my app, but there’s still a whole other Testing feature that it has that I'm starting to look into. Everything I’ve tried out has been pretty quick and easy so hopefully I can play around with the Testing more to help me catch any other authentication or authorization vulnerabilities that might exist in my app. If this is something that interests you, you can check it out at https://metlo.com .
- Top open source security devtools you need to know about
- Open Source API Security Tool
- OS API Inventory and Testing Tool
-
Show HN: Quickly Create Security Tests for All Your APIs (YC S21)
* Once you have the right templates you can build rules to apply these templates to many endpoints at once (https://docs.metlo.com/docs/test-rules). This makes it possible to write hundreds of tests against your API in just a few clicks :)
We have more info on our docs here: https://docs.metlo.com/docs/writing-a-test. And here's a demo video if you’d like a quick walk-through :) https://www.loom.com/share/f342f186e756489aa7a500be875a5539
We’d love to hear your thoughts!
[0] https://github.com/metlo-labs/metlo
-
Launch HN: Metlo (YC S21) – Open-source software for securing your APIs
Our website is at https://metlo.com, repo is at https://github.com/metlo-labs/metlo. There’s a demo video here: https://www.loom.com/share/2c38c731cf044288995e5ee2566528a7. Check out our sandbox at https://demo.metlo.com (no email required). You can get started with our hosted service (in Beta) for free at https://app.metlo.com/signup (there’s an always free tier, and paid tier is not enforced yet) , or you can self-host by following the instructions at https://docs.metlo.com/docs/deploy-to-aws.
- Metlo: Open-source API security platform
javascript-obfuscator
-
Need ideas with modding TCOAAL
I don't need/use IDA, Nemlei just used https://obfuscator.io/, which just obfuscates the crap out of the code using various known methods (which I won't go into detail, it's public knowledge) and an un-obfuscation was cooked up by others. The one fucked-up thing the website does is randomizing function names, it just changes every variable/function name. We can't "un-obfuscate" those, so it's up to our brains to figure out what the code does, and change the names back.
- Javascript Deobfuscation
-
Question about backticks
I was considering using a obfuscation library (https://github.com/javascript-obfuscator/javascript-obfuscator) and noticed in the usage example that backticks are used and the javascript is enclosed within. The issue is that my javascript already has backticks from using template literals so my code then errors out.
-
How To Secure Your JavaScript Applications
Obfuscation: JavaScript Obfuscator
- my friend showed me his code, thees are all functions
-
Which options do I have to hide/obfuscate/bytecode my main source code but not the renderer? Angular inside.
What I ended up doing is having two build steps, one for renderer and other for the main process, in the main process build I use https://github.com/javascript-obfuscator/javascript-obfuscator. Works pretty fine.
- Whats going on in this HTML JS phishing attempt
-
How do human read code like this
It's to purposefully makes your code harder to read so it prevents people from stealing your work. Here's a tool that does it: https://obfuscator.io/
-
TIL you can de-obfuscate code with ChatGPT
I just tested it on a little snippet of my code obfuscated with https://obfuscator.io/ and it worked seemingly perfectly.
My original code:
function resizeImage(img) {
-
Reverse Engineering TikTok's VM Obfuscation (Part 2)
https://obfuscator.io/ produces a similar result, perhaps that's all they used.
What are some alternatives?
helmet - Help secure Express apps with various HTTP headers
HaikunatorJS - Generate Heroku-like random names to use in your node applications.
stepci - Automated API Testing and Quality Assurance
rollup-plugin-obfuscator - Rollup plugin for javascript-obfuscator
Sentry - Developer-first error tracking and performance monitoring
jsfuck - Write any JavaScript with 6 Characters: []()!+
juice-shop - OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
docx - Easily generate and modify .docx files with JS/TS with a nice declarative API. Works for Node and on the Browser.
sso-wall-of-shame - A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.
url-pattern - easier than regex string matching patterns for urls and other strings. turn strings into data or data into strings.
kubeshark - The API traffic analyzer for Kubernetes providing real-time K8s protocol-level visibility, capturing and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clusters. Inspired by Wireshark, purposely built for Kubernetes
rollup-plugin-ts - A TypeScript Rollup plugin that bundles declarations, respects Browserslists, and enables seamless integration with transpilers such as babel and swc