Krabby Posted January 10, 2021 Posted January 10, 2021 During my research, i noticed that there's some difference between packed electron apps. Some of them are rally easy de-packable,and the source code it's really well understandable and not too much obfuscated. Sometimes i found the whole source compiled into a Javascript compiled file. The obfuscation of the code doesn't seems to hard, in fact if it was packed with bytenode there's still the possibility do debug it with the same module. But,to get deeper into it, what could be a good approach to analyze it fully? Cause it looks like it has no library dipendency cause all the node modules used are packed inside the jsc file. Also it's quite hard to debug it cause it looks like it can be debugged just with the original engine it was compiled with. Any help is appreciated 😉🙌
whoknows Posted January 10, 2021 Posted January 10, 2021 dont know about JSC, but previously forum.tuts4you.com/topic/42177-snapshot_blobbin-manipulation
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now