Attacking a stack based JavaScript virtual machine
blog.pixelmelt.dev·24w
Preview
Report Post

Analysing Pixelmelt’s Javascript Virtualisation Obfuscation - A Research Study

Attacking a stack based JavaScript virtual machine Artistic rendition of how I was asked to help with project

I was asked by my friend @PixelMelt to help out with a research project he was working on, focused on the analysis of a few JavaScript obfuscators. I happily agreed to take part and was asked to analyse one of three different obfuscators:

  1. Obfuscator.io: Likely the most common JavaScript obfuscator.
  2. JS-Confuser: A newer obfuscator with some nice techniques.
  3. PISTOL: PixelMelt’s JavaScript Virtualisation Obfu…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help