rusty-jsyc
fingerprintjs
rusty-jsyc | fingerprintjs | |
---|---|---|
2 | 346 | |
163 | 20,963 | |
- | 0.8% | |
0.0 | 7.8 | |
12 months ago | 12 days ago | |
Rust | TypeScript | |
GNU Lesser General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
rusty-jsyc
- Reverse Engineering TikTok's VM Obfuscation (Part 2)
-
Reverse Engineering TikTok's VM Obfuscation (Part 1)
Based on my previous research into this, the magic keywords to find this kind of thing on Google are "virtualization obfuscation" or "VM obfuscation".
rusty-jsyc is the main open source implementation I've found, though it hasn't been touched in a few years: https://jwillbold.com/posts/obfuscation/2019-06-16-the-secre... (GitHub: https://github.com/jwillbold/rusty-jsyc)
I think there are other implementations, but they're proprietary so I didn't look into them very much. There are lots of posts out there about reversing virtualization obfuscation, but not many about implementing it. Seems like most people who put the effort into implementing it tend to prefer selling it commercially (which I suppose makes sense).
fingerprintjs
What are some alternatives?
pocket - Mixed Boolean Arithmetic Expression Obfuscator
AmIUnique - Learn how identifiable you are on the Internet
javascript-obfuscator - A powerful obfuscator for JavaScript and Node.js
Laravel - The Laravel Framework.
ezkl - ezkl is an engine for doing inference for deep learning models and other computational graphs in a zk-snark (ZKML). Use it from Python, Javascript, or the command line.
ungoogled-chromium - Google Chromium, sans integration with Google
shape-security-decompiler-toolkit - Full dynamic tool kit that is capable of deobfuscating and decompiling shape security's virtual machine obfuscation
evercookie - Produces persistent, respawning "super" cookies in a browser, abusing over a dozen techniques. Its goal is to identify users after they've removed standard cookies and other privacy data such as Flash cookies (LSOs), HTML5 storage, SilverLight storage, and others.
blog - nullpt.rs website
brave-core - Core engine for the Brave browser for mobile and desktop. For issues https://github.com/brave/brave-browser/issues
warbirdvm - An analysis of the Warbird virtual-machine protection for the CI!g_pStore
chromium - The official GitHub mirror of the Chromium source