Skip to content
This repository has been archived by the owner on Apr 26, 2022. It is now read-only.
/ JVP Public archive

JavaScript obfuscator for onetap V4 (deprecated)

License

Notifications You must be signed in to change notification settings

liujiahua123123/JVP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

JVP

one JS obfuscator for onetap V4 (deprecated)

Due to the deprecated of relevant usage scenarios, some functionality is now making public 
, and it's no longer maintained (but still work).

Description

  • Designed for Onetap(https://www.onetap.com/) JS
  • Work under the assumption that Onetap JS Evluator makes sure function Cheat.GetUsername never got rewritten
  • It build one unique file for each onetap user
  • It convert every Property Call to Element Call, and add a mapper from each calls to the actual Onetap function, strings of element call was encoded so that it can only be decoded with the correct username.
  • The real function call from element call are also depends on username, wrong username lead to wrong function call, trying to inverse from wrong function call to deduce the username wont work because those check only use half of the username, e.g: Cheat[Cheat["GetUsername"]["charAt"](0) === "g"? "function_map_1" : "function_map_2"](arguments) (string already decrpty for clearity)
  • This program was written in 2020, game rules might already changed.

Advantages and Disadvantage

Advantages

  • It's hardly possible for someone to load the javascript that don't belong to him(that means, that file wasn't encrypt with his username)
  • It's hardly possible for people who don't know what the username was used to encrypt the JS to decrypt it.
  • The efficiency during program runs does not get significant affect.

Disadvantages

  • It's hard but possible for people who know what the username was used to encrypt the JS to decrypt it.
  • Loading the Javascript take times, because of those string decrypt and bad crypto

String Encrypt Methods

  • Kim64: A changed version of Base64, with random alphabat order and xor in raw bytes
  • Magnify_String: changed all raw string to the same length, so people wont be able to guess the raw string by the length of Kim64 string
  • DecodeString: Decode bytes with Xor keys to string, the Xor keys are generated from username, same username always provide same key.

UI

Demo

Raw.
Encoded.

About

JavaScript obfuscator for onetap V4 (deprecated)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published