You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Major rewrite and expansion of the main README and the detectors' README:
- Added clear project overview, use cases, CLI/API usage, troubleshooting, and contribution instructions.
- Provided detailed, structured documentation for each supported obfuscation type and detector.
- Standardized and enhanced JSDoc comments for all detector modules and shared detection methods:
- Clarified function purposes, parameters, and return values.
- Improved consistency and accuracy of documentation across the codebase.
- Refactored and clarified code in detector modules and shared methods:
- Improved variable naming and fixed typos in comments.
- Made logic and intent clearer, especially in shared detection utilities.
Detect different types of JS obfuscation by their AST structure.
5
+
## Overview
6
+
Obfuscation Detector is a tool for identifying different types of JavaScript obfuscation by analyzing the code's Abstract Syntax Tree (AST). It is designed for security researchers, reverse engineers, and developers who need to quickly determine if and how a JavaScript file has been obfuscated.
7
+
8
+
**Use Cases:**
9
+
- Automated analysis of suspicious or third-party JavaScript
10
+
- Security auditing and malware research
11
+
- Integration into CI/CD pipelines to flag obfuscated code
12
+
- Educational purposes for understanding obfuscation techniques
13
+
14
+
## How it Works
15
+
Obfuscation Detector parses JavaScript code into an AST using [flAST](https://www.npmjs.com/package/flast) and applies a series of modular detectors. Each detector looks for specific patterns or structures that are characteristic of known obfuscation techniques. The tool can return all matching types or just the most likely (best) match.
0 commit comments