Owl4444

Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.

55
5
100% credibility
Found Feb 05, 2026 at 39 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
JavaScript
AI Summary

A visual workbench for deobfuscating obfuscated JavaScript code by chaining transformations, viewing AST structures, and analyzing scopes.

How It Works

1
🔍 Find the deobfuscator

You hear about a handy tool for unscrambling messy JavaScript code from a demo video and grab it to analyze suspicious scripts.

2
🚀 Open the workbench

Launch the app on your computer and see a clean workspace with side-by-side code editors ready for action.

3
📋 Paste your code

Copy the tangled, obfuscated JavaScript into the left editor and watch it light up with colors and line numbers.

4
🔗 Build your cleanup chain

Drag simple fixes like 'decode strings' or 'remove junk' into a recipe list on the side, tweaking each one until it feels right.

5
▶️ Run the magic

Hit play and see the right editor fill with cleaner code step by step, plus charts showing what changed.

6
👁️ Explore the details

Peek at the family tree of the code or variable map on the right to spot hidden patterns and understand the fixes.

Get readable code

Enjoy your now-clear JavaScript that's easy to read and analyze, ready to save as a project or share with friends.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 39 to 55 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is jsdeob-workbench?

jsdeob-workbench is a visual reverse engineering app for deobfuscating JavaScript, turning webpack bundles, obfuscator.io output, or malware samples into readable code. Paste obfuscated JS into the input editor, chain AST transforms from the sidebar—like Cyberchef for JS—and inspect live changes in the output editor, AST viewer, and scope analyzer. Built in JavaScript with Monaco editors, it runs locally via npm start or as a standalone exe.

Why is it gaining traction?

It stands out with a drag-and-drop transform chain interface, built-ins for common tricks (string decoding, constant folding, opaque predicate removal), and a script editor for custom Babel plugins with autocomplete on AST paths and types. Step-through diffs, project saving, and plugin sharing beat raw REPL tinkering or CLI tools, making github reverse engineering workflows faster. YouTube demos show real obfuscated JS unpacking in minutes.

Who should use this?

Security researchers reverse engineering malware JS payloads, devs debugging minified third-party bundles, or analysts handling packed scripts in incident response. Ideal for reverse engineering jobs where you chain AST transforms on obfuscated code without constant Babel boilerplate.

Verdict

Solid pick for JS reverse engineering despite 51 stars and 1.0% credibility score—early but functional with good docs and builtins covering 80% of cases. Test on your samples; pair with manual tweaks for edge cases like JSFuck deep nesting.

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.