Jscrambler is a JavaScript protection technology for Web and Mobile Applications. Its main purpose is to enable JavaScript applications to become self-defensive and resilient to tampering and reverse engineering.
Jscrambler includes four security layers:
- Advanced Obfuscation: transformations to Strings, Variables, Functions, and Objects, through reordering, encoding, splitting, renaming, and logic concealing techniques that make the code extremely difficult to read and reverse-engineer. Includes control-flow flattening by adding opaque predicates and irrelevant code clones and flattening the control-flow;
- Code Locks: ability to prevent the protected code from running outside whitelisted domains, browsers, date ranges, and OS'es;
- Self-Defending: anti-tampering and anti-debugging techniques that break the code functionality when debugging or a tampering attempt occurs;
- Self-Healing: ability to recover from tampering attacks by preserving the original behavior of the application even after attacker modifications.
Jscrambler has a Polymorphic Behavior, so each new code deployment generates a different protected output with the same code functionality.
Source maps provide a way of mapping obfuscated code back to its original source code, helping the debugging process of obfuscated code as if you were running the original source code.
From version 6.0 onwards, Jscrambler enables monitoring threats to protected code in real-time. Any attempt to modify or debug protected code will display a detailed alert in the Live Feed dashboard.
You can integrate Jscrambler into your build process easily with its API client. It also has several integrations.