noble-secp256k1
javascript-obfuscator
noble-secp256k1 | javascript-obfuscator | |
---|---|---|
3 | 45 | |
696 | 12,790 | |
- | 1.4% | |
7.5 | 4.0 | |
13 days ago | 16 days ago | |
JavaScript | TypeScript | |
MIT License | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
noble-secp256k1
-
A beginner's guide to constant-time cryptography (2017)
I noticed in July of 2022 that Go did exactly the vulnerable example and reported it to the security team.
https://github.com/golang/go/issues/53849
It was fixed as of Go 1.21 https://go.dev/doc/go1.21
---
The article cites JavaScript, which is not constant time. There's no sure way to do constant time operations in JavaScript and thus no secure way to do crypto directly in Javascript. Browsers like Firefox depend on low level calls which should be implemented in languages that are constant time capable.
JavaScript needs something like constant time WASM in order to do crypto securely, but seeing the only constant time WASM project on GitHub has only 16 stars and the last commit was 2 years ago, it doesn't appear to have much interest. https://github.com/WebAssembly/constant-time
However, for JavaScript, I recommend Paul's library Noble which is "hardened to be algorithmically constant time". It is by far the best library available for JavaScript. https://github.com/paulmillr/noble-secp256k1
- Noble Cryptography
- How to encrypt data in JS using a library
javascript-obfuscator
-
Need ideas with modding TCOAAL
I don't need/use IDA, Nemlei just used https://obfuscator.io/, which just obfuscates the crap out of the code using various known methods (which I won't go into detail, it's public knowledge) and an un-obfuscation was cooked up by others. The one fucked-up thing the website does is randomizing function names, it just changes every variable/function name. We can't "un-obfuscate" those, so it's up to our brains to figure out what the code does, and change the names back.
- Javascript Deobfuscation
-
Question about backticks
I was considering using a obfuscation library (https://github.com/javascript-obfuscator/javascript-obfuscator) and noticed in the usage example that backticks are used and the javascript is enclosed within. The issue is that my javascript already has backticks from using template literals so my code then errors out.
-
How To Secure Your JavaScript Applications
Obfuscation: JavaScript Obfuscator
- my friend showed me his code, thees are all functions
-
Which options do I have to hide/obfuscate/bytecode my main source code but not the renderer? Angular inside.
What I ended up doing is having two build steps, one for renderer and other for the main process, in the main process build I use https://github.com/javascript-obfuscator/javascript-obfuscator. Works pretty fine.
- Whats going on in this HTML JS phishing attempt
-
How do human read code like this
It's to purposefully makes your code harder to read so it prevents people from stealing your work. Here's a tool that does it: https://obfuscator.io/
-
TIL you can de-obfuscate code with ChatGPT
I just tested it on a little snippet of my code obfuscated with https://obfuscator.io/ and it worked seemingly perfectly.
My original code:
function resizeImage(img) {
-
Reverse Engineering TikTok's VM Obfuscation (Part 2)
https://obfuscator.io/ produces a similar result, perhaps that's all they used.
What are some alternatives?
zkp-ecdsa - Proves knowledge of an ECDSA-P256 signature under one of many public keys that are stored in a list.
HaikunatorJS - Generate Heroku-like random names to use in your node applications.
elliptic - Fast Elliptic Curve Cryptography in plain javascript
rollup-plugin-obfuscator - Rollup plugin for javascript-obfuscator
secp256k1-voi - High assurance Go secp256k1 (Mirror)
jsfuck - Write any JavaScript with 6 Characters: []()!+
Ed25519Tool - Ed25519 signing and verification online tool.
docx - Easily generate and modify .docx files with JS/TS with a nice declarative API. Works for Node and on the Browser.
trezor-suite - :candy: Trezor Suite Monorepo
url-pattern - easier than regex string matching patterns for urls and other strings. turn strings into data or data into strings.
VulnTLS - Collection of TLS vulnerabilities ready to be exploited.
rollup-plugin-ts - A TypeScript Rollup plugin that bundles declarations, respects Browserslists, and enables seamless integration with transpilers such as babel and swc