
JavaScript Deobfuscator
} 14 console[_0x34c7bc(-(0x1e7c + -0x1 * -0x1367 + 0x2ef * -0x11))](_0x498b9b(-(0x1020 + 0x253 + 0x7 * -0x2a2)) + _0x23a1(-(0x12c5 + -0x1887 + -0x1 * -0x5c5)) + total); Deobfuscate
Obfuscator.io Deobfuscator
Obfuscator.io Deobfuscator Obfuscator.io Deobfuscator A tool to undo obfuscation performed by obfuscator.io
Reversing VMCrack - Reverse Engineering Blog
Sep 1, 2024 · Reverse engineering a binary obfuscated with virtual machine obfuscation. The challenge is vmcrack from Hack The Box.
Reversing a Broken Rust Binary - blog.deobfuscate.io
May 12, 2024 · This post describes reverse engineering a Rust binary from the rev section of TBTL Capture The Flag 2024. The challenge is named Safe Rust and provides a compiled Rust program.
Reverse Engineering Blog
May 19, 2024 · A blog covering reverse engineering and related topics. Investigating a HTML Obfuscator 20 Feb 2025 I received an email recently suggesting I take a look at a HTML obfuscator. …
Investigating a HTML Obfuscator - blog.deobfuscate.io
Feb 20, 2025 · To deobfuscate this, I copied the contents of the two objects from the debugger, and wrote a simple script using Babel to replace all of their usages. This looked roughly like this:
Bankrupting Bezos: Donations CTF Challenges - blog.deobfuscate.io
Apr 30, 2024 · This post describes the Donations and Donations (but I fixed it) challenges by tahmid-23 in the web category of University of Maryland Capture The Flag 2024.
Using Symbolic Execution to Devirtualise a Virtualised Binary
Jul 22, 2024 · Using symbolic execution to reverse engineer and devirtualise a binary using virtual machine obfuscation.
landing.deobfuscate.io - Ocule
Site security provided by Ocule Checking your browser.
Hand Crafted Artisan Compiled Binary - blog.deobfuscate.io
Apr 30, 2024 · This post describes the cmsc430 challenge by aparker, in the rev category of University of Maryland Capture The Flag 2024. The challenge provides a single binary, chal, which the author …