Obfuscation is not security – AI can deobfuscate any minified JavaScript code

https://www.afterpack.dev/blog/claude-code-source-leak

#HackerNews #Obfuscation #Security #AI #JavaScript #Deobfuscation

Claude Code's Source Didn't Leak. It Was Already Public for Years.

Everyone's calling it a source code leak. But Claude Code's entire CLI was already on npm, in plaintext, readable by anyone. Here's what actually happened — and why it matters.

A comprehensive article from #CheckPoint Research

"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"

https://research.checkpoint.com/2025/generative-ai-for-reverse-engineering/

From the article:
"The use of AI doesn’t eliminate the need for human expertise. XLoader’s most sophisticated protections, such as scattered key derivation logic and multi-layer function encryption, still require manual analysis and targeted adjustments. But the heavy lifting of triage, #deobfuscation, and scripting can now be accelerated dramatically. What once took days can now be compressed into hours."

#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp

Leveraging Generative AI to Reverse Engineer XLoader

Check Point Research succeeded in understanding the infamous malware family, Xloader, by leveraging Generative AI

Check Point Research

Defeating AuraStealer: Practical Deobfuscation Workflows for Modern Infostealers: https://www.gendigital.com/blog/insights/research/defeating-aurastealer-obfuscation

#infostealer #analysis #deobfuscation

Defeating AuraStealer: Practical Deobfuscation Workflows for Modern Infostealers

A technical walkthrough of obfuscation, anti-analysis and data theft capabilities

🚨 Ever tangled with virtual machine-based code protection? 🚨

In 2020, I wrote a virtual machine deobfuscator for a crack me challenge. I've learned a lot doing that challenge and wrote a 2-part series for it:

https://malwareandstuff.com/taming-virtual-machine-based-code-protection-1/

https://malwareandstuff.com/taming-virtual-machine-based-code-protection-2/

🔍 #ReverseEngineering #MalwareAnalysis #windows #idapro #deobfuscation

Taming Virtual Machine Based Code Protection – 1

Overcoming obfuscation in binaries has always been an interesting topic for me, especially in combination with malware. Over the last weeks I’ve been playing around with Virtualised Code Prot…

Malware and Stuff
My new post about #malware #deobfuscation - https://cert.pl/en/posts/2025/04/peephole-deobfuscation/. I focus on the simple - but powerful - technique of local substitutions. Uses #ghidra and ghidralib.
Deobfuscation techniques: Peephole deobfuscation

In this article we describe a basic deobfuscation technique by leveraging a code snippet substitution.

💣 Full write-up for "Tales for the Brave" - this year's Hard forensics challenge from Hack The Box Cyber Apocalypse CTF - Tales From Eldoria.

🔸 Code #deobfuscation
🔸 hashtag#Telegram data exfiltration
🔸 Malware behavioral analysis

🔗 https://blog.cyberethical.me/htb-ctf-2025-forensics-tales-for-the-brave

#CyberEthical #CyberApocalypse25 #HackTheBox #forensics #EthicalHacking #blueteaming #itsec #dataexfiltration #malware

🎩 Oh, look! Another tool to "deobfuscate" strings from garbled binaries, because obviously your life was incomplete without it. 🙄 Google Cloud wants you to believe it's revolutionary, but really, it's just another way to make you feel guilty for not understanding #Kubernetes. 😂
https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries #deobfuscation #GoogleCloud #techhumor #binarytools #developerlife #HackerNews #ngated
GoStringUngarbler: Deobfuscating Strings in Garbled Binaries | Google Cloud Blog

We discuss how threat actors protect malware with garble obfuscation, and the process of automatically deobfuscating it.

Google Cloud Blog
GoStringUngarbler: Deobfuscating Strings in Garbled Binaries | Google Cloud Blog

We discuss how threat actors protect malware with garble obfuscation, and the process of automatically deobfuscating it.

Google Cloud Blog

Как приготовить обфускацию в JavaScript и не сжечь лабараторию: AST, babel, плагины

Вероятно каждый программист или компания, сталкивались с мыслями о своей крутости или хотя бы крутости своих алгоритмов 😎. Разумеется, в этом случае может возникнуть соответствующее нежелание делиться разработками с широкой аудиторией. Данная проблема минимизируется переносом части кода на сервер (если речь идёт о клиент-серверных приложениях). Однако, такой подход не всегда применим, и порой обстоятельства вынуждают нас оставлять чувствительные участки кода прямо на виду. В этой статье мы познакомимся, как минимум, с крутым словом, а по возможности с такой техникой как обфускация в контексте языка JavaScript. Реализуем механизмы для скрытия алгоритмов и усложнения обратной разработки кода. Попутно, мы посмотрим что такое AST, и приведём инструменты, с помощью которых можно взаимодействовать с ним для реализации обфускации.

https://habr.com/ru/articles/870152/

#javascript #reverseengineering #obfuscation #ast #babel #deobfuscation

Как приготовить обфускацию в JavaScript и не сжечь лабораторию: AST, babel, плагины

Вступление Вероятно каждый программист или компания, сталкивались с мыслями о своей крутости или хотя бы крутости своих алгоритмов 😎. Разумеется, в этом случае может возникнуть соответствующее...

Хабр
LLVM-powered deobfuscation of virtualized binaries

Virtualization is a powerful technique for code obfuscation, and reversing it can be challenging. In this post, we cover the work done during an internship on developing an automated devirtualization tool. We explore a simplified taint-based approach and discuss its limitations. For a more in-depth analysis, the full report is also made available.

THALIUM