当前位置:网站首页>JS content confusion, return content encryption
JS content confusion, return content encryption
2022-06-30 01:25:00 【Fan zhidu】
The target site :
a04a7c5e14846edd70e5bb4c4ba8a69aa947a5c001dac7cfeff16c1db3a152389b76b67b89c670a2baf3dffa5fb54d7ead18604d550b6ebff3e432102e08d976
Refresh , stay fidder And developer tools to search , I can't find it , Then take a look at the following : Obviously transcoded .

The solution here is , Install first ast Environmental Science ,npm init Be sure to add

You must add types here , Then add the environment

And then convert the code :
//dec_main.js
import { parse } from "@babel/parser";
import generate from "@babel/generator";
import * as types from "@babel/types";
import traverse from "@babel/traverse";
import fs from "fs";
// Read js file
const jscode = fs.readFileSync('./democode.js', "utf-8");
let ast = parse(jscode);//js turn ast
function decry_str(ast) {
// Restore numbers and characters
traverse.default(ast, {
'StringLiteral|NumericLiteral|DirectiveLiteral'(path) {// Iteration string | Iterative array matching --16 Hexadecimal text restore
delete path.node.extra; // Delete extra parts of the node - Trigger raw value processing
},
});
return ast;
}
ast = decry_str(ast)// Hexadecimal digit restoration and character restoration
let {code} = generate.default(ast,{jsescOption:{"minimal":true}})
// file save
fs.writeFile('./demoNew.js', code, (err) => {
});边栏推荐
- 3-6sql injection website instance step 5: break through the background to obtain web administrator permissions
- Taguchi experimental method
- Three text to speech artifacts, each of which is very practical
- Interface Association of postman
- Varnish 基础概览5
- Solution to webkitformboundaryk in post request
- Analysis of IM instant messaging development technology on modern web
- Questions about database: database attachment
- Wechat applet - requestsubscribemessage:fail can only be invoked by user tap gesture
- Cookie加密12
猜你喜欢

Some thoughts on small program subcontracting and verification of uiniapp subcontracting optimization logic

Cookie加密10

Is the numpy index the same as the image index?

cookie加密8

What if you can't write your composition well? Ape counseling: parents should pay attention to these points

Resizekit2.net size and resolution independent

STC89C52 single chip microcomputer simple calculator design and code demonstration

Seata 与三大平台携手编程之夏,百万奖金等你来拿

2022-06-29: x = {a, B, C, D}, y = {e, F, G, H}, the length of the two small arrays X and Y is 4. If yes: a + e = B + F = C + G = D + H

Understand the module function of MES management system
随机推荐
Sentinel source code analysis Part 6 - sentinel adapter module Chapter 4 zuul2 gateway
Varnish 基础概览2
Quick pow: how to quickly find power
快手伸手“供给侧”,找到直播电商的“源头活水”?
[Thesis Writing] English thesis writing guide
Wechat applet - requestsubscribemessage:fail can only be invoked by user tap gesture
Analysis of natural frequency and buckling load of cylinder by finite element method
Varnish 基础概览1
Text classification using huggingface
【图神经网络】图分类学习研究综述[3]:图分类方法评价及未来研究方向
Some thoughts on small program subcontracting and verification of uiniapp subcontracting optimization logic
Is the numpy index the same as the image index?
Interface Association of postman
81. search rotation sort array II
Internal class usage scenarios, syntax and principle explanations
Error reporting in Luban H5 installation
Rubymine development tool, refactoring and intention operation
Kubernetes core object overview details
Precautions for postoperative fundus hemorrhage / / must see every day
Mechanical --nx2007 (UG) -- gap analysis (interference inspection)