#javascriptobfuscation نتائج البحث

Mojang is removing code obfuscation in Java! - Starting in next week's snapshot there will be experimental non-obfuscated versions released alongside the normal obfuscated ones - They will become the normal non-experimental versions in the first Spring Drop 2026 snapshot

harristic_'s tweet image. Mojang is removing code obfuscation in Java!

- Starting in next week's snapshot there will be experimental non-obfuscated versions released alongside the normal obfuscated ones
- They will become the normal non-experimental versions in the first Spring Drop 2026 snapshot

Minecraft just announced they’re removing obfuscation from their Java edition!! This is so exciting for creating mods and finally understanding how the underlying software operates!

bonduraul's tweet image. Minecraft just announced they’re removing obfuscation from their Java edition!! 

This is so exciting for creating mods and finally understanding how the underlying software operates!

🚨 ¡CAMBIO HISTÓRICO en Minecraft Java! Mojang eliminará la OBFUSCACIÓN 🧩 Antes el código estaba oculto para evitar piratería 🏴‍☠️ y los modders debían descifrarlo 😵‍💫 Ahora el código será visible 👀, crear y actualizar mods será más fácil!


Released JS-DOMestify — convert any JavaScript into code that uses only letters and the symbols + , . = Try it: nowasky.github.io/JS-DOMestify #javascript #xss

nowaskyjr's tweet image. Released JS-DOMestify — convert any JavaScript into code that uses only letters and the symbols + , . = 

Try it: nowasky.github.io/JS-DOMestify

#javascript #xss

MOJANG IS REMOVING OBFUSCATION FROM JAVA!!! PEAK

CagilMartin's tweet image. MOJANG IS REMOVING OBFUSCATION FROM JAVA!!! PEAK

Cloudflare WAF Bypass → XSS 💡 The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS: --'<00 foo="<a%20href="javascript​:prompt(404)">XSS-Click</00>--%20// #BugBounty #XSS #infosec #bugbountytips

viehgroup's tweet image. Cloudflare WAF Bypass → XSS 💡

The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS:

--&apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript​:prompt(404)&quot;&amp;gt;XSS-Click&amp;lt;/00&amp;gt;--%20//

#BugBounty #XSS #infosec #bugbountytips

Cloudflare WAF Bypass → XSS 💡 The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS: --'<00 foo="<a%20href="javascript​:prompt(404)">XSS-Click</00>--%20// #CyberSecurity #BugBounty #XSS

NullSecurityX's tweet image. Cloudflare WAF Bypass → XSS 💡

The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS:

--&apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript​:prompt(404)&quot;&amp;gt;XSS-Click&amp;lt;/00&amp;gt;--%20//

#CyberSecurity #BugBounty #XSS

Mojang is removing obfuscation from the Java edition of Minecraft. The game's code will ship with readable class/method names (not scrambled), making it way easier for modders and devs to create mods, data packs, and custom features without reverse-engineering.

Pirat_Nation's tweet image. Mojang is removing obfuscation from the Java edition of Minecraft.

The game&apos;s code will ship with readable class/method names (not scrambled), making it way easier for modders and devs to create mods, data packs, and custom features without reverse-engineering.

JSNinja - Hunting Bugs in JavaScript! JSNinja is a powerful tool for extracting URLs and sensitive information from JavaScript files. Github #tools #hunting

HackingTeam777's tweet image. JSNinja - Hunting Bugs in JavaScript!

JSNinja is a powerful tool for extracting URLs and sensitive information from JavaScript files.

Github 

#tools #hunting

Here's how the obfuscation in #flareon12 challenge 7 looks like in source - all just junk code 🗑️

m_r_tz's tweet image. Here&apos;s how the obfuscation in #flareon12 challenge 7 looks like in source - all just junk code 🗑️
m_r_tz's tweet image. Here&apos;s how the obfuscation in #flareon12 challenge 7 looks like in source - all just junk code 🗑️
m_r_tz's tweet image. Here&apos;s how the obfuscation in #flareon12 challenge 7 looks like in source - all just junk code 🗑️

Obfuscated XSS Tips🤣: <script>x=this?.[[]?.x??/a/.source+'\x6c'+13439..toString?.(30)],void/͏//[1]?.findIndex?.(x)//DebugCode</script> alert(1) Fired🔥 PoC: sandbox.moe/poc/xss/obfusc…

reinforchu's tweet image. Obfuscated XSS Tips🤣:

&amp;lt;script&amp;gt;x=this?.[[]?.x??/a/.source+&apos;\x6c&apos;+13439..toString?.(30)],void/͏//[1]?.findIndex?.(x)//DebugCode&amp;lt;/script&amp;gt;

alert(1) Fired🔥
PoC: sandbox.moe/poc/xss/obfusc…

🔖Here's 3 tools you can use to effectively find sensitive information in JS files: 1. Hakrawler Extracting JavaScript files. 🔗Link : github.com/hakluke/hakraw… 2. LinkFinder Finding Endpoints in JS files. 🔗Link : github.com/GerbenJavado/L… 3. jsluice Extract URLs, paths, secrets…

TheMsterDoctor1's tweet image. 🔖Here&apos;s 3 tools you can use to effectively find sensitive information in JS files:

1. Hakrawler
Extracting JavaScript files.
🔗Link : github.com/hakluke/hakraw…

2. LinkFinder
Finding Endpoints in JS files. 
🔗Link : github.com/GerbenJavado/L…

3. jsluice
Extract URLs, paths, secrets…

🧠 CSP Bypass → DOM XSS 1️⃣ script-src was strict, but object-src left open 2️⃣ Injected SVG file with embedded JS 3️⃣ Loaded via <object data=evil.svg> → executes in origin 4️⃣ JS inside SVG triggers DOM sink (location.hash) 🎯 Full CSP bypass → DOM-based XSS #bugbounty #xss

NullSecurityX's tweet image. 🧠 CSP Bypass → DOM XSS
1️⃣ script-src was strict, but object-src left open
2️⃣ Injected SVG file with embedded JS
3️⃣ Loaded via &amp;lt;object data=evil.svg&amp;gt; → executes in origin
4️⃣ JS inside SVG triggers DOM sink (location.hash)
🎯 Full CSP bypass → DOM-based XSS
#bugbounty #xss

been using this techniques to bypass many WAFs, open the console in the vulnrable page, run this code to extract variables refering to window object: for(let x in window)if(window[x]===window)console.log(x); then leaverage it to execute JS functions, happy hunting :]

YShahinzadeh's tweet image. been using this techniques to bypass many WAFs, open the console in the vulnrable page, run this code to extract variables refering to window object:

for(let x in window)if(window[x]===window)console.log(x);

then leaverage it to execute JS functions, happy hunting :]

obfus.h is the very powerfull compile-time obfuscator for C (win32/64). Supports virtualization, anti-debugging, control flow obfuscation and other code mutation techniques to prevent disassembly or decompilation. #CodeSecurity #Obfuscation #infosec github.com/DosX-dev/obfus…

horsicq's tweet image. obfus.h is the very powerfull compile-time obfuscator for C (win32/64). Supports virtualization, anti-debugging, control flow obfuscation and other code mutation techniques to prevent disassembly or decompilation. #CodeSecurity #Obfuscation #infosec

github.com/DosX-dev/obfus…

I usually brute-force API paths with "Debug":true parameter and often it leads to reveal internal debug info to reverse proxies exposing API secrets and tokens.

_jensec's tweet image. I usually brute-force API paths with &quot;Debug&quot;:true parameter and often it leads to reveal internal debug info to reverse proxies exposing API secrets and tokens.

🚨A Mojang removeu oficialmente a ofuscação no Minecraft Java Ofuscação é o termo usado para se referir a ocultação de partes do código do jogo, e com a liberação, será mais fácil criar, expandir e editar mods 📝Leia mais: minecraft.net/en-us/article/…

craftminePortal's tweet image. 🚨A Mojang removeu oficialmente a ofuscação no Minecraft Java

Ofuscação é o termo usado para se referir a ocultação de partes do código do jogo, e com a liberação, será mais fácil criar, expandir e editar mods

📝Leia mais:
minecraft.net/en-us/article/…

11,000 lines of haunted JavaScript. One analyst. One monitor. One mission: survive the obfuscation. @_Dwyer_ isn’t afraid of code that fights back. Watch him tame monstrous stealers and pull IOCs from the shadows (if you dare) binarydefense.com/resources/blog…


It's next week! ⏳🗓 Let's explore the fascinating and complex world of JavaScript code obfuscation, focusing on the dangers of using the free obfuscation tools available on the market. Make sure to register now at js.jscrambler.com/webinars/debun… 📥 #JavaScript #JavaScriptObfuscation


@Wrestletube_net Read this first: avgthreatlabs.com/website-safety… some comments say it shouldnt be showing as malware #JavaScriptObfuscation


Computer security can be really depressing sometimes..all the time. #javascriptobfuscation


لا توجد نتائج لـ "#javascriptobfuscation"
لا توجد نتائج لـ "#javascriptobfuscation"
Loading...

Something went wrong.


Something went wrong.


United States Trends