WHAT’S NEW IN 6.0

Jscrambler version 6.0 is now live! Learn what’s new in this major update.

Request a Free Demo

Groundbreaking Protection with
JavaScript Threat Monitoring

JavaScript Threat Monitoring

1. Monitor all your protected code in real-time: Jscrambler warns you if your JavaScript Code is being debugged, tampered, or used outside a code lock, enabling you to immediately take any supplementary actions;

2. Easily access all information and statistics for your protected apps through our revamped dashboard;

3. Mitigate client-side threats in real-time with Webpage Integrity, using the same dashboard.

Always Ahead of Reverse-Engineering Tools

Stronger resilience against de-obfuscators

We continuously research specific RE tools and techniques and apply additional protection against them.

Constant updates and testing

Our infrastructure receives constant updates to ensure that your new protections are resilient against all the latest RE tools.

Easier version control

All our plans now provide you with full control over the product version, making your continuous integration processes easier.

Easier version control

All our plans now provide you with full control over the product version, making your continuous integration processes easier.

Stronger resilience against de-obfuscators

We continuously research specific RE tools and techniques and apply additional protection against them.

Constant updates and testing

Our infrastructure receives constant updates to ensure that your new protections are resilient against all the latest RE tools.

Easier version control

All our plans now provide you with full control over the product version, making your continuous integration processes easier.

Stronger resilience against de-obfuscators

We continuously research specific RE tools and techniques and apply additional protection against them.

New transformations focused on resilience and potency

Better Obfuscation of Variables and IdentifiersWe’re focused on adding new transformations to cover more targets. These new transformations are designed to be combined with our control flow obfuscation, for a more resilient and potent result.

Before

function getUrl(protocol, domain) { if(!protocol || !domain) throw new Error("Invalid Args"); var url = protocol+'://'+domain; var endpoint = '/app'; return url + endpoint; }

After

function ca() { var j = d.x()[2][6]; for (; j !== d.x()[5][9];) { switch (j) { case d.x()[0][11]: j = !a[0][0] || !a[0][1] ? d.x()[8][5] : d.x()[11][3]; break; case d.n()[7][0]: var a = [arguments]; j = d.n()[1][5]; break; case d.n()[0][5]: throw h(b1.a(7)); j = d.x()[3][3]; break; case d.x()[8][9]: a[5] = a[0][0] + b1.c(2) + a[0][1]; a[7] = b1.a(5); return a[5] + a[7]; } } }

After

function ca() { var j = d.x()[2][6]; for (; j !== d.x()[5][9];) { switch (j) { case d.x()[0][11]: j = !a[0][0] || !a[0][1] ? d.x()[8][5] : d.x()[11][3]; break; case d.n()[7][0]: var a = [arguments]; j = d.n()[1][5]; break; case d.n()[0][5]: throw h(b1.a(7)); j = d.x()[3][3]; break; case d.x()[8][9]: a[5] = a[0][0] + b1.c(2) + a[0][1]; a[7] = b1.a(5); return a[5] + a[7]; } } }

Before

function getUrl(protocol, domain) { if(!protocol || !domain) throw new Error("Invalid Args"); var url = protocol+'://'+domain; var endpoint = '/app'; return url + endpoint; }

After

function ca() { var j = d.x()[2][6]; for (; j !== d.x()[5][9];) { switch (j) { case d.x()[0][11]: j = !a[0][0] || !a[0][1] ? d.x()[8][5] : d.x()[11][3]; break; case d.n()[7][0]: var a = [arguments]; j = d.n()[1][5]; break; case d.n()[0][5]: throw h(b1.a(7)); j = d.x()[3][3]; break; case d.x()[8][9]: a[5] = a[0][0] + b1.c(2) + a[0][1]; a[7] = b1.a(5); return a[5] + a[7]; } } }

Before

function getUrl(protocol, domain) { if(!protocol || !domain) throw new Error("Invalid Args"); var url = protocol+'://'+domain; var endpoint = '/app'; return url + endpoint; }

Countermeasures built for real attack scenarios

Break Application

Every time that someone tries to break a lock in your code or triggers the self-defending module, your app will completely stop working.

Custom Callback Function

Get full control over the countermeasure by specifying your own function to be triggered, such as an alert to your SIEM.

Terminate Web Session

When an attack is detected, you can automatically terminate the attacker’s web session by clearing cookies.

Redirect

Automatically redirect the user to a specified URL, such as terminating a debugging session by redirecting to a new page.

Redirect

Automatically redirect the user to a specified URL, such as terminating a debugging session by redirecting to a new page.

Break Application

Every time that someone tries to break a lock in your code or triggers the self-defending module, your app will completely stop working.

Custom Callback Function

Get full control over the countermeasure by specifying your own function to be triggered, such as an alert to your SIEM.

Terminate Web Session

When an attack is detected, you can automatically terminate the attacker’s web session by clearing cookies.

Redirect

Automatically redirect the user to a specified URL, such as terminating a debugging session by redirecting to a new page.

Break Application

Every time that someone tries to break a lock in your code or triggers the self-defending module, your app will completely stop working.
SCHEDULE YOUR FREE DEMO TO KNOW HOW JSRAMBLER CAN PROTECT YOUR APPS AND USERS
* Required fields

REQUEST A FREE DEMO TO KNOW HOW JSCRAMBLER CAN PROTECT YOUR APPLICATIONS AND YOUR USERS.

Leave your contact details and we will contact you shortly.