-
So I tried to deobfuscate a JAR, in the detection mode this was my output:
```
[main] INFO com.javadeobfuscator.deobfuscator.Deobfuscator - Loading classpath
[main] INFO com.javadeobfuscator.deobfu…
-
Currently, we are using uglifyjs tool to build our corpus, but there are many other obfuscators people can use. If someone wants to test the web front end, then the most likely tool to use will be wh…
-
```
Starting with .NET 2.0, there is a standard attribute to control the
behavior of obfuscators:
http://msdn.microsoft.com/en-us/library/System.Reflection.ObfuscationAttribute.a
spx
obfuscar should …
-
```
[main] INFO com.javadeobfuscator.deobfuscator.Deobfuscator - Loading classpath
[main] INFO com.javadeobfuscator.deobfuscator.Deobfuscator - Loading input
[main] INFO com.javadeobfuscator.deobfu…
-
Currently Cecil fails to read an assembly which has a non sorted GenericParameterTable.
-
The current stackstrings algorithm used in the Go extraction code needs to be updated to improve efficiency and accuracy. The existing implementation might not be optimal for handling certain scenario…
-
The security is never sufficient. This is a fact.
Yet the .NET compiled projects is practically distributed full source code for everyone which can work with a computer and can download basic decompi…
-
Would like to know how this funky library works due to JS quirks.
-
Title.
-
Some malware will have misleading strings or other indicators of things that will trick either an analyst or automated tools. For example, https://github.com/The-FBI/ObfuscationAttributes