obfuscation

What are JavaScript's builtin strings?

倾然丶 夕夏残阳落幕 提交于 2019-12-17 05:16:07
问题 this question is difficult to summarize in a question title UPDATE I created a JSFiddle that builds an obfuscated string out of your input based on the letters extracted from this question: You can access it here, or would a gist be easier? I recently came across a fun bit of obfuscated JavaScript in this profile that looks like this: javascript:[[]+1/!1][1^1][1>>1]+({}+[])[1<<1^11>>1]+([]+!!- [])[1<<1]+[/~/+{}][+!1][-~1<<1]+([]+/-/[(!!1+[])[1>>1]+(!!1 +[])[1<<1^1]+(!1+[])[1|1<<1]+(!!1+[])[1

Best Java obfuscator? [closed]

陌路散爱 提交于 2019-12-17 02:19:37
问题 As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance. Closed 8 years ago . I am developing a security software and want to obfuscate my java code so it will become impossible to reverse engineer. What is the

Proguard claims to obfuscate the .apk, but does not

馋奶兔 提交于 2019-12-14 03:33:11
问题 I'm exporting an Android application from Eclipse. Proguard thinks it is obfuscating the .apk according to the console, dump.txt, mapping.txt, seeds.txt and usage.txt output, but when I decompile the .apk itself it is not obfuscated. Names of classes and fields are intact. I have tried various different Proguard configs but there doesn't seem to be anything wrong in terms of the configs. I make sure to clean the project so the classes.dex file won't be outdated. 回答1: This worked for me in

PHP Code obfuscation

ⅰ亾dé卋堺 提交于 2019-12-14 02:15:36
问题 I had a php obfuscation program a while ago but I forgot what it was called. It could obfuscate code, and confuse people who knew a little php. Here's what an obfuscated example looks like: <?php session_start();include("\x6c\x69b/\x62\x2f\x6d\x69nd/m\x61x\x2e\x70h\x70");${"G\x4c\x4f\x42A\x4cS"}["s\x69lv\x62g"]="\x70\x5ft\x69\x74\x6c\x65";$wdrvnbyeveu="\x70\x5ft\x69\x74\x6c\x65";secure();switch($_GET["\x64"]){case"r":${${"\x47L\x4f\x42AL\x53"}["s\x69\x6c\x76\x62\x67"]}="R\x65p\x6c\x79\x20\x74

Dynamically Obfuscate HTML

痴心易碎 提交于 2019-12-13 20:05:39
问题 I was wondering if there was any way to dynamically obfuscate html on a live server but not offline, so soon as my website was visited the source would be obfuscated rather than in plain text. 回答1: If you are using php, IonCube has a plugin. it can be found here: http://www.ioncube.com/html_encoder.php it turns your html page into minified javascript. 回答2: Since the client (browser) will have to parse it into a sensible DOM tree, this is pretty much fruitless. These days it's a lot more

.NET Obfuscation [SmartAssembly]

北战南征 提交于 2019-12-13 14:47:05
问题 Just a quick question in relation to SmartAssembly and .NET applications. - I am experimenting with the software at the moment and it seems to be obfuscating code but My.Settings is still visible in plain text? So previous to obfucating my code (using .NET reflector) I could literally see almost everything. Including the My.Settings class containing lots of info such as passwords, ip's, MySQL connection strings etc.. So I obfuscated the code using RedGate's SmartAssembly and sure enough all

Laravel 5.4 Mix How to Mangle / Uglify / Obfuscate Scripts

北慕城南 提交于 2019-12-13 07:05:59
问题 Laravel 5.4 - Mix How to Mangle / Uglify / Obfuscate Scripts I use gulp on previous version. Thank you 回答1: From the Laravel Mix documentation: mix.options({ extractVueStyles: false, processCssUrls: true, purifyCss: false, uglify: {}, postCss: [] }); You can use the uglify option to merge any custom uglify options that your project requires 来源: https://stackoverflow.com/questions/42870454/laravel-5-4-mix-how-to-mangle-uglify-obfuscate-scripts

Javascript comma syntax, and complex expressions, minified, obfuscated: please help me understand a piece of code

半城伤御伤魂 提交于 2019-12-13 07:03:15
问题 I need to understand some pieces of code. I feel fine with the syntax of Java, C++, PHP, but Javascript syntax is still a "dark forest" for me. Here are the original forms and possible interpretations, I mean equivalents in terms of program logic: 1. var o, a, s = "https://widget.kiwitaxi.com", c = e.createElement("iframe"), l = e.getElementById(r.target), p = r && r.height_bias ? 4 + r.height_bias : 4, u = !1, f = parseInt(r.min_height, 10) ? parseInt(r.min_height, 10) : r.hide_form_extras &

Android Archive (AAR) package obfuscation

心已入冬 提交于 2019-12-13 04:56:52
问题 I'm setting obfuscation rules for a library project (AAR file). All the rules are respected. However, all the package names aren't obfuscated. The default behavior for the obfuscation is that all package names are obfuscated, are there any special rules to obfuscate package names? 来源: https://stackoverflow.com/questions/30356498/android-archive-aar-package-obfuscation

Multiplication Table with One Line of Code

微笑、不失礼 提交于 2019-12-13 02:56:16
问题 One line of code seems misleading. What I meant was in the form of a for ( ; ; ) ; . While trying out lambda expression, just for fun, I have coded the program below. What I did was to change the third expression of the for-loop, where usually ++i resides, into lambda function. The output is also shown. It's like an obfuscated code but it seems to do the work, anyway. I was wondering if it was possible to do it in similar way with Java. for (int i=1; i<10; [](int i) {for (int j=2; j<10; ++j)