deobfuscation

Breaking lexical scope to prevent finding all references

℡╲_俬逩灬. 提交于 2021-02-11 12:28:55
问题 Apart from text-to-code methods, like eval / Function , or adding additional scripts, are there any more ways to shroud lexical scoping, which would invalidate a basic lexical search for an identifier's declaration, and all references? This is related to e.g. vs-code's "rename" (F2 by default), more precisely, implementing similar functionality. In other words, locally observing a snippet from a larger program, and renaming an identifier - not in a normal "best practice" situation, but where

Protecting Java code of a game [closed]

旧巷老猫 提交于 2021-02-05 10:55:58
问题 Closed . This question needs to be more focused. It is not currently accepting answers. Want to improve this question? Update the question so it focuses on one problem only by editing this post. Closed 7 years ago . Improve this question Let's assume that after a few years of work I would have a 3D game ready, that can be downloaded by millions of people worldwide, it would be a game running on a client-server model. As far as I understand anyone can look at other people's source code if they

Is this deep obfuscation? Cannot understand the meaning of it

帅比萌擦擦* 提交于 2021-01-27 23:12:16
问题 Given the following script: É = -~-~[], ó = -~É, Ë = É << É, þ = Ë + ~[]; Ì = (ó - ó)[Û = ('' + {})[É + ó] + ('' + {})[ó - É] + ([].ó + '')[ó - É] + (!!'' + '')[ó] + ({} + '')[ó + ó] + (!'' + '')[ó - É] + (!'' + '')[É] + ('' + {})[É + ó] + ({} + '')[ó + ó] + ('' + {})[ó - É] + (!'' + '')[ó - É]][Û]; Ì(Ì((!'' + '')[ó - É] + (!'' + '')[ó] + (!'' + '')[ó - ó] + (!'' + '')[É] + ((!'' + ''))[ó - É] + ([].$ + '')[ó - É] + '\'' + '' + '\\' + (ó - É) + (É + É) + (ó - É) + '\\' + (þ) + (É + ó) + '\\'

How to deobfuscate an Android stacktrace using mapping file

让人想犯罪 __ 提交于 2021-01-14 13:37:55
问题 I got a stacktrace from the crashreporting system and it is obfuscated, like ... Failed resolution of: Lru/test/c/b/a; ... I have a mapping file. How to deobfuscate this stacktrace using mapping.txt? 回答1: Get deobfuscated crash stacktrace from your app page Upload your mapping.txt to your app PlayStore page with the following steps: Sign in to your Play Console. Select an app. On the left menu, click Android vitals > Deobfuscation files. Next to a version of your app, click Upload. Upload the

How to deobfuscate an Android stacktrace using mapping file

喜你入骨 提交于 2021-01-14 13:33:08
问题 I got a stacktrace from the crashreporting system and it is obfuscated, like ... Failed resolution of: Lru/test/c/b/a; ... I have a mapping file. How to deobfuscate this stacktrace using mapping.txt? 回答1: Get deobfuscated crash stacktrace from your app page Upload your mapping.txt to your app PlayStore page with the following steps: Sign in to your Play Console. Select an app. On the left menu, click Android vitals > Deobfuscation files. Next to a version of your app, click Upload. Upload the

Im trying to figure out how I can decompile this obfuscated Lua script

孤街浪徒 提交于 2020-12-08 05:16:09
问题 So I've been trying to figure out how to decompile dlls, java, and Lua files but once I ran into this one I got stumped. Does anyone have any ideas on how I can decompile this? Since the script was way too big I put it in a pastebin link. https://pastebin.com/UsdWEHnm IlIIl1liIllIi1II1Ii.lIl1llIllIii1111lIIIii = lIli1IlI11lIlI1il11i1() lIli1IlI11lIlI1il11i1() lIli1IlI11lIlI1il11i1() local ll1ili1i1Ii1II111li = lIlIlll1Ill1illiliIiI() for i1IiIili111iI1lil1l = lIliI1iii11lilII1IIil,

Im trying to figure out how I can decompile this obfuscated Lua script

为君一笑 提交于 2020-12-08 05:14:50
问题 So I've been trying to figure out how to decompile dlls, java, and Lua files but once I ran into this one I got stumped. Does anyone have any ideas on how I can decompile this? Since the script was way too big I put it in a pastebin link. https://pastebin.com/UsdWEHnm IlIIl1liIllIi1II1Ii.lIl1llIllIii1111lIIIii = lIli1IlI11lIlI1il11i1() lIli1IlI11lIlI1il11i1() lIli1IlI11lIlI1il11i1() local ll1ili1i1Ii1II111li = lIlIlll1Ill1illiliIiI() for i1IiIili111iI1lil1l = lIliI1iii11lilII1IIil,

Encoded JavaScript: How to decode?

久未见 提交于 2020-06-10 02:13:29
问题 I recently bought a script from a guy that isn't replying anymore, and left me with the script obfuscated and not working. The thing is that everything works except the encoded part, which gives error. I've tried every website on google to un-obfuscate this, with no luck. How can I "decrypt" this part to make this script work? var _0x4091 = ['.r_popup', 'transform', 'translateY(', 'px)', 'scroll', 'html', 'click', 'opacity', 'display', 'block', 'target', 'parents', 'length', 'fadeOut',

I need anyone that can, decode “Luraph Obfuscator”

房东的猫 提交于 2020-05-28 06:46:45
问题 I paid an untrusted developer for a script. And as I thought he scammed me. He did send me code, but he obfuscated the script. It is for a game called "Roblox" that uses Lua, the code will be down below. As from I can tell by running it, it might work. But I would need to change the script for it to work. Does anyone know to to decode the obfuscation? https://pastebin.com/B8SZmZGE local ilIillllII1i1lliliI = assert local II1ll1iliIIIIillIli = select local lIlillIlIi11I1lIIi11I = tonumber