Try the Full Version

Obfuscating individual files manually is a time consuming and error prone process.
To get the full benefits of JSDefender, click below to download a full-featured trial.

Try Now      Get a Quote

Here are Some of the Ways We Protect Your JavaScript Code

Transform Description
Boolean Literals Transforms the false and true literals to other expressions that result in the same false and true values, respectively.
Console Cloaking Prevents the protected code from displaying information in the console when the code invokes the methods of the console object, such as console.log,, etc. This suppresses debug and diagnostic information that might be useful to an attacker running the code.
Control Flow Protection Obfuscates the program's control flow by adding opaque predicates or dead code and flattening the control flow.
Date Lock Injects code into the protected source, which tests if the current date is in a particular interval. If so, the code runs normally; otherwise, it can either exit or run a custom script.
Debugger Removal Removes information from production code that can help hackers inspect your code.
DevTools Blocking For browser-based JavaScript, detects if the DevTools panel is open in the browser. If so, the protected script continuously stops the program at a breakpoint and does not allow an attacker to debug it.
Domain Lock Allows binding the code to a specific domain (or its subdomains). When the code running in the browser originates from a non-matching domain, it breaks with an error.
Expression Sequence Obfuscation Collects adjacent expression statements in the code and joins them into an expression sequence that is harder to understand.
Function Reordering Moves functions from their original locations to a new one in the same lexical scope. When the *randomize* option is turned on, it sets the new location randomly.
Global Object Hiding Hides references to frequently used global objects and functions (such as window, navigator, Object, String, setTimeout, etc.). These references often give useful hints to attackers trying to reverse-engineer the code.
Integer Literals Transforms integer literals to other (less obvious) expressions that result in the same value when evaluated. It can also transform all integer literals to a specific radix (binary, decimal, hexadecimal, or octal).
Local Declaration Mangles the names of local declarations.
Property Sparsing Transforms object literal expression assignments into multiple assignment statements to make them harder to read.
Property Indirection Transforms direct property access to indirect property access.
String Literals Extracts string literals into variables and initializes those variables from encoded string literals. Replaces the original string with the corresponding variables.
Tamper Detection Wraps critical code with guarding functions, which check at runtime for modifications. Tampered code will not run correctly.
Variable Grouping Protection Separates variable declarations and initializations; it moves the declaration part to the end of the declaration scope.

By evaluating and using this tool, the user agrees to the terms of use.