GitHub.com
tcp/443 tcp/80
Heroku
tcp/443 tcp/80
Vercel
tcp/443 tcp/80
Open service 99.83.151.71:443 · deobfuscate.io
2026-01-13 00:23
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Origin: https://deobfuscate.io
Cache-Control: public, max-age=0
Content-Length: 20584
Content-Type: text/html; charset=UTF-8
Date: Tue, 13 Jan 2026 00:23:49 GMT
Etag: W/"5068-19ba9b39bd8"
Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263829"}],"max_age":3600}
Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263829"
Server: Heroku
Vary: Origin
Via: 1.1 heroku-router
X-Powered-By: Express
Connection: close
Page title: JavaScript Deobfuscator
<!DOCTYPE html>
<html lang="en">
<head>
<!-- Meta Data -->
<title>JavaScript Deobfuscator</title>
<meta charset="utf-8" />
<meta
name="description"
content="A simple but powerful deobfuscator to remove common JavaScript
obfuscation techniques"
/>
<meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag() {
dataLayer.push(arguments);
}
gtag('js', new Date());
gtag('config', 'G-PK6YQBK0W0');
</script>
<script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
<script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
<script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
<script>
window.ezstandalone = window.ezstandalone || {};
ezstandalone.cmd = ezstandalone.cmd || [];
ezstandalone.cmd.push(function () {
ezstandalone.showAds(103, 104);
});
</script>
<meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
<!-- Links-->
<link rel="stylesheet" href="./assets/css/main.css" />
<link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
<link rel="icon" href="/favicon.ico" />
</head>
<body>
<!-- Error popup modal -->
<div
id="errorPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="errorPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="errorPopupModal"
class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
>
<div>
<div class="text-center">
<h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
Error
</h3>
<div class="mt-2">
<p class="text-sm text-gray-500">
There was an error deobfuscating your code. Check the console for more details.
</p>
</div>
</div>
</div>
<div class="mt-5">
<button
id="errorPopupConfirmButton"
type="button"
class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
>
Ok
</button>
</div>
</div>
</div>
</div>
</div>
<!-- Obfuscator.io popup modal -->
<div
id="obfIoPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="obfIoPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="obfIoPopupModal"
class="popupModal relative transform overflow-hid
Open service 75.2.97.79:80 · deobfuscate.io
2026-01-13 00:23
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Origin: https://deobfuscate.io
Cache-Control: public, max-age=0
Content-Length: 20584
Content-Type: text/html; charset=UTF-8
Date: Tue, 13 Jan 2026 00:24:51 GMT
Etag: W/"5068-19ba9b39bd8"
Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=VrBfrmv29t830AWVe4vdc%2B00VVGxyilTYzhlmZrPcbE%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263891"}],"max_age":3600}
Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=VrBfrmv29t830AWVe4vdc%2B00VVGxyilTYzhlmZrPcbE%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263891"
Server: Heroku
Vary: Origin
Via: 1.1 heroku-router
X-Powered-By: Express
Connection: close
Page title: JavaScript Deobfuscator
<!DOCTYPE html>
<html lang="en">
<head>
<!-- Meta Data -->
<title>JavaScript Deobfuscator</title>
<meta charset="utf-8" />
<meta
name="description"
content="A simple but powerful deobfuscator to remove common JavaScript
obfuscation techniques"
/>
<meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag() {
dataLayer.push(arguments);
}
gtag('js', new Date());
gtag('config', 'G-PK6YQBK0W0');
</script>
<script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
<script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
<script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
<script>
window.ezstandalone = window.ezstandalone || {};
ezstandalone.cmd = ezstandalone.cmd || [];
ezstandalone.cmd.push(function () {
ezstandalone.showAds(103, 104);
});
</script>
<meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
<!-- Links-->
<link rel="stylesheet" href="./assets/css/main.css" />
<link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
<link rel="icon" href="/favicon.ico" />
</head>
<body>
<!-- Error popup modal -->
<div
id="errorPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="errorPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="errorPopupModal"
class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
>
<div>
<div class="text-center">
<h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
Error
</h3>
<div class="mt-2">
<p class="text-sm text-gray-500">
There was an error deobfuscating your code. Check the console for more details.
</p>
</div>
</div>
</div>
<div class="mt-5">
<button
id="errorPopupConfirmButton"
type="button"
class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
>
Ok
</button>
</div>
</div>
</div>
</div>
</div>
<!-- Obfuscator.io popup modal -->
<div
id="obfIoPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="obfIoPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="obfIoPopupModal"
class="popupModal relative transform overflow-hid
Open service 13.248.132.87:80 · deobfuscate.io
2026-01-13 00:23
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Origin: https://deobfuscate.io
Cache-Control: public, max-age=0
Content-Length: 20584
Content-Type: text/html; charset=UTF-8
Date: Tue, 13 Jan 2026 00:24:50 GMT
Etag: W/"5068-19ba9b39bd8"
Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263890"}],"max_age":3600}
Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263890"
Server: Heroku
Vary: Origin
Via: 1.1 heroku-router
X-Powered-By: Express
Connection: close
Page title: JavaScript Deobfuscator
<!DOCTYPE html>
<html lang="en">
<head>
<!-- Meta Data -->
<title>JavaScript Deobfuscator</title>
<meta charset="utf-8" />
<meta
name="description"
content="A simple but powerful deobfuscator to remove common JavaScript
obfuscation techniques"
/>
<meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag() {
dataLayer.push(arguments);
}
gtag('js', new Date());
gtag('config', 'G-PK6YQBK0W0');
</script>
<script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
<script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
<script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
<script>
window.ezstandalone = window.ezstandalone || {};
ezstandalone.cmd = ezstandalone.cmd || [];
ezstandalone.cmd.push(function () {
ezstandalone.showAds(103, 104);
});
</script>
<meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
<!-- Links-->
<link rel="stylesheet" href="./assets/css/main.css" />
<link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
<link rel="icon" href="/favicon.ico" />
</head>
<body>
<!-- Error popup modal -->
<div
id="errorPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="errorPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="errorPopupModal"
class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
>
<div>
<div class="text-center">
<h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
Error
</h3>
<div class="mt-2">
<p class="text-sm text-gray-500">
There was an error deobfuscating your code. Check the console for more details.
</p>
</div>
</div>
</div>
<div class="mt-5">
<button
id="errorPopupConfirmButton"
type="button"
class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
>
Ok
</button>
</div>
</div>
</div>
</div>
</div>
<!-- Obfuscator.io popup modal -->
<div
id="obfIoPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="obfIoPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="obfIoPopupModal"
class="popupModal relative transform overflow-hid
Open service 35.71.145.101:443 · deobfuscate.io
2026-01-13 00:23
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Origin: https://deobfuscate.io
Cache-Control: public, max-age=0
Content-Length: 20584
Content-Type: text/html; charset=UTF-8
Date: Tue, 13 Jan 2026 00:23:49 GMT
Etag: W/"5068-19ba9b39bd8"
Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263829"}],"max_age":3600}
Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263829"
Server: Heroku
Vary: Origin
Via: 1.1 heroku-router
X-Powered-By: Express
Connection: close
Page title: JavaScript Deobfuscator
<!DOCTYPE html>
<html lang="en">
<head>
<!-- Meta Data -->
<title>JavaScript Deobfuscator</title>
<meta charset="utf-8" />
<meta
name="description"
content="A simple but powerful deobfuscator to remove common JavaScript
obfuscation techniques"
/>
<meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag() {
dataLayer.push(arguments);
}
gtag('js', new Date());
gtag('config', 'G-PK6YQBK0W0');
</script>
<script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
<script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
<script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
<script>
window.ezstandalone = window.ezstandalone || {};
ezstandalone.cmd = ezstandalone.cmd || [];
ezstandalone.cmd.push(function () {
ezstandalone.showAds(103, 104);
});
</script>
<meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
<!-- Links-->
<link rel="stylesheet" href="./assets/css/main.css" />
<link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
<link rel="icon" href="/favicon.ico" />
</head>
<body>
<!-- Error popup modal -->
<div
id="errorPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="errorPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="errorPopupModal"
class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
>
<div>
<div class="text-center">
<h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
Error
</h3>
<div class="mt-2">
<p class="text-sm text-gray-500">
There was an error deobfuscating your code. Check the console for more details.
</p>
</div>
</div>
</div>
<div class="mt-5">
<button
id="errorPopupConfirmButton"
type="button"
class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
>
Ok
</button>
</div>
</div>
</div>
</div>
</div>
<!-- Obfuscator.io popup modal -->
<div
id="obfIoPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="obfIoPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="obfIoPopupModal"
class="popupModal relative transform overflow-hid
Open service 35.71.145.101:80 · deobfuscate.io
2026-01-13 00:23
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Origin: https://deobfuscate.io
Cache-Control: public, max-age=0
Content-Length: 20584
Content-Type: text/html; charset=UTF-8
Date: Tue, 13 Jan 2026 00:24:50 GMT
Etag: W/"5068-19ba9b39bd8"
Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263890"}],"max_age":3600}
Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263890"
Server: Heroku
Vary: Origin
Via: 1.1 heroku-router
X-Powered-By: Express
Connection: close
Page title: JavaScript Deobfuscator
<!DOCTYPE html>
<html lang="en">
<head>
<!-- Meta Data -->
<title>JavaScript Deobfuscator</title>
<meta charset="utf-8" />
<meta
name="description"
content="A simple but powerful deobfuscator to remove common JavaScript
obfuscation techniques"
/>
<meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag() {
dataLayer.push(arguments);
}
gtag('js', new Date());
gtag('config', 'G-PK6YQBK0W0');
</script>
<script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
<script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
<script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
<script>
window.ezstandalone = window.ezstandalone || {};
ezstandalone.cmd = ezstandalone.cmd || [];
ezstandalone.cmd.push(function () {
ezstandalone.showAds(103, 104);
});
</script>
<meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
<!-- Links-->
<link rel="stylesheet" href="./assets/css/main.css" />
<link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
<link rel="icon" href="/favicon.ico" />
</head>
<body>
<!-- Error popup modal -->
<div
id="errorPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="errorPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="errorPopupModal"
class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
>
<div>
<div class="text-center">
<h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
Error
</h3>
<div class="mt-2">
<p class="text-sm text-gray-500">
There was an error deobfuscating your code. Check the console for more details.
</p>
</div>
</div>
</div>
<div class="mt-5">
<button
id="errorPopupConfirmButton"
type="button"
class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
>
Ok
</button>
</div>
</div>
</div>
</div>
</div>
<!-- Obfuscator.io popup modal -->
<div
id="obfIoPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="obfIoPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="obfIoPopupModal"
class="popupModal relative transform overflow-hid
Open service 13.248.132.87:443 · deobfuscate.io
2026-01-13 00:23
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Origin: https://deobfuscate.io
Cache-Control: public, max-age=0
Content-Length: 20584
Content-Type: text/html; charset=UTF-8
Date: Tue, 13 Jan 2026 00:23:49 GMT
Etag: W/"5068-19ba9b39bd8"
Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263829"}],"max_age":3600}
Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263829"
Server: Heroku
Vary: Origin
Via: 1.1 heroku-router
X-Powered-By: Express
Connection: close
Page title: JavaScript Deobfuscator
<!DOCTYPE html>
<html lang="en">
<head>
<!-- Meta Data -->
<title>JavaScript Deobfuscator</title>
<meta charset="utf-8" />
<meta
name="description"
content="A simple but powerful deobfuscator to remove common JavaScript
obfuscation techniques"
/>
<meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag() {
dataLayer.push(arguments);
}
gtag('js', new Date());
gtag('config', 'G-PK6YQBK0W0');
</script>
<script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
<script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
<script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
<script>
window.ezstandalone = window.ezstandalone || {};
ezstandalone.cmd = ezstandalone.cmd || [];
ezstandalone.cmd.push(function () {
ezstandalone.showAds(103, 104);
});
</script>
<meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
<!-- Links-->
<link rel="stylesheet" href="./assets/css/main.css" />
<link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
<link rel="icon" href="/favicon.ico" />
</head>
<body>
<!-- Error popup modal -->
<div
id="errorPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="errorPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="errorPopupModal"
class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
>
<div>
<div class="text-center">
<h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
Error
</h3>
<div class="mt-2">
<p class="text-sm text-gray-500">
There was an error deobfuscating your code. Check the console for more details.
</p>
</div>
</div>
</div>
<div class="mt-5">
<button
id="errorPopupConfirmButton"
type="button"
class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
>
Ok
</button>
</div>
</div>
</div>
</div>
</div>
<!-- Obfuscator.io popup modal -->
<div
id="obfIoPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="obfIoPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="obfIoPopupModal"
class="popupModal relative transform overflow-hid
Open service 75.2.97.79:443 · deobfuscate.io
2026-01-13 00:23
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Origin: https://deobfuscate.io
Cache-Control: public, max-age=0
Content-Length: 20584
Content-Type: text/html; charset=UTF-8
Date: Tue, 13 Jan 2026 00:23:49 GMT
Etag: W/"5068-19ba9b39bd8"
Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263829"}],"max_age":3600}
Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263829"
Server: Heroku
Vary: Origin
Via: 1.1 heroku-router
X-Powered-By: Express
Connection: close
Page title: JavaScript Deobfuscator
<!DOCTYPE html>
<html lang="en">
<head>
<!-- Meta Data -->
<title>JavaScript Deobfuscator</title>
<meta charset="utf-8" />
<meta
name="description"
content="A simple but powerful deobfuscator to remove common JavaScript
obfuscation techniques"
/>
<meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag() {
dataLayer.push(arguments);
}
gtag('js', new Date());
gtag('config', 'G-PK6YQBK0W0');
</script>
<script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
<script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
<script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
<script>
window.ezstandalone = window.ezstandalone || {};
ezstandalone.cmd = ezstandalone.cmd || [];
ezstandalone.cmd.push(function () {
ezstandalone.showAds(103, 104);
});
</script>
<meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
<!-- Links-->
<link rel="stylesheet" href="./assets/css/main.css" />
<link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
<link rel="icon" href="/favicon.ico" />
</head>
<body>
<!-- Error popup modal -->
<div
id="errorPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="errorPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="errorPopupModal"
class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
>
<div>
<div class="text-center">
<h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
Error
</h3>
<div class="mt-2">
<p class="text-sm text-gray-500">
There was an error deobfuscating your code. Check the console for more details.
</p>
</div>
</div>
</div>
<div class="mt-5">
<button
id="errorPopupConfirmButton"
type="button"
class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
>
Ok
</button>
</div>
</div>
</div>
</div>
</div>
<!-- Obfuscator.io popup modal -->
<div
id="obfIoPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="obfIoPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="obfIoPopupModal"
class="popupModal relative transform overflow-hid
Open service 99.83.151.71:80 · deobfuscate.io
2026-01-13 00:23
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Origin: https://deobfuscate.io
Cache-Control: public, max-age=0
Content-Length: 20584
Content-Type: text/html; charset=UTF-8
Date: Tue, 13 Jan 2026 00:24:50 GMT
Etag: W/"5068-19ba9b39bd8"
Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263890"}],"max_age":3600}
Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263890"
Server: Heroku
Vary: Origin
Via: 1.1 heroku-router
X-Powered-By: Express
Connection: close
Page title: JavaScript Deobfuscator
<!DOCTYPE html>
<html lang="en">
<head>
<!-- Meta Data -->
<title>JavaScript Deobfuscator</title>
<meta charset="utf-8" />
<meta
name="description"
content="A simple but powerful deobfuscator to remove common JavaScript
obfuscation techniques"
/>
<meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
<meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
<link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag() {
dataLayer.push(arguments);
}
gtag('js', new Date());
gtag('config', 'G-PK6YQBK0W0');
</script>
<script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
<script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
<script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
<script>
window.ezstandalone = window.ezstandalone || {};
ezstandalone.cmd = ezstandalone.cmd || [];
ezstandalone.cmd.push(function () {
ezstandalone.showAds(103, 104);
});
</script>
<meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
<!-- Links-->
<link rel="stylesheet" href="./assets/css/main.css" />
<link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
<link rel="icon" href="/favicon.ico" />
</head>
<body>
<!-- Error popup modal -->
<div
id="errorPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="errorPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="errorPopupModal"
class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
>
<div>
<div class="text-center">
<h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
Error
</h3>
<div class="mt-2">
<p class="text-sm text-gray-500">
There was an error deobfuscating your code. Check the console for more details.
</p>
</div>
</div>
</div>
<div class="mt-5">
<button
id="errorPopupConfirmButton"
type="button"
class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
>
Ok
</button>
</div>
</div>
</div>
</div>
</div>
<!-- Obfuscator.io popup modal -->
<div
id="obfIoPopupContainer"
class="popupContainer relative z-10"
aria-labelledby="modal-title"
role="dialog"
aria-modal="true"
>
<div
id="obfIoPopupBg"
class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
></div>
<div class="fixed inset-0 z-10 overflow-y-auto">
<div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
<div
id="obfIoPopupModal"
class="popupModal relative transform overflow-hid
Open service 2606:50c0:8000::153:443 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 200 OK Connection: close Content-Length: 701 Server: GitHub.com Content-Type: text/html; charset=utf-8 Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT Access-Control-Allow-Origin: * Strict-Transport-Security: max-age=31556952 ETag: "6953eddf-2bd" expires: Thu, 01 Jan 2026 04:55:19 GMT Cache-Control: max-age=600 x-proxy-cache: MISS X-GitHub-Request-Id: 7C52:35C252:2EF2781:330881B:6955FBDF Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-lga21927-LGA X-Cache: HIT X-Cache-Hits: 5 X-Timer: S1767242719.304872,VS0,VE0 Vary: Accept-Encoding X-Fastly-Request-ID: 987226767488527105fd68ed8813dceedcba80b6 Page title: Obfuscator.io Deobfuscator <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
Open service 2606:50c0:8002::153:443 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 200 OK Connection: close Content-Length: 701 Server: GitHub.com Content-Type: text/html; charset=utf-8 x-origin-cache: HIT Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT Access-Control-Allow-Origin: * Strict-Transport-Security: max-age=31556952 ETag: "6953eddf-2bd" expires: Thu, 01 Jan 2026 04:55:19 GMT Cache-Control: max-age=600 x-proxy-cache: MISS X-GitHub-Request-Id: 439A:1E3944:59E7FC2:5CB978F:6955FBDF Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-sjc10072-SJC X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.417937,VS0,VE2 Vary: Accept-Encoding X-Fastly-Request-ID: 2fff31cadea302215a19fb4fda9aa7d5914727c7 Page title: Obfuscator.io Deobfuscator <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
Open service 2606:50c0:8003::153:443 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 200 OK Connection: close Content-Length: 701 Server: GitHub.com Content-Type: text/html; charset=utf-8 Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT Access-Control-Allow-Origin: * Strict-Transport-Security: max-age=31556952 ETag: "6953eddf-2bd" expires: Thu, 01 Jan 2026 04:55:19 GMT Cache-Control: max-age=600 x-proxy-cache: MISS X-GitHub-Request-Id: 7C52:35C252:2EF2781:330881B:6955FBDF Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-lga21947-LGA X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.265777,VS0,VE2 Vary: Accept-Encoding X-Fastly-Request-ID: d63ac95bc445cfb685ee201c66f74981107f126d Page title: Obfuscator.io Deobfuscator <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
Open service 185.199.111.153:443 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 200 OK Connection: close Content-Length: 701 Server: GitHub.com Content-Type: text/html; charset=utf-8 x-origin-cache: HIT Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT Access-Control-Allow-Origin: * Strict-Transport-Security: max-age=31556952 ETag: "6953eddf-2bd" expires: Thu, 01 Jan 2026 04:55:19 GMT Cache-Control: max-age=600 x-proxy-cache: MISS X-GitHub-Request-Id: 23FC:3BD049:4E15B4A:4F84E24:6955FBDE Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-lcy-egml8630087-LCY X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.339336,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: f1f927adc4eb51a09ea0620d737fb1d8e0e5899c Page title: Obfuscator.io Deobfuscator <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
Open service 185.199.111.153:80 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://obf-io.deobfuscate.io/ X-GitHub-Request-Id: 6889:35D5BF:A946B63:ABAB229:6955FBDF Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-fra-eddf8230183-FRA X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.339896,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: 38169d0a6d431edfec4f738534c66fff2052aec0 Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 185.199.109.153:80 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://obf-io.deobfuscate.io/ X-GitHub-Request-Id: 6EE6:F1323:5695429:595E33D:6955FBDF Accept-Ranges: bytes Age: 0 Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish X-Served-By: cache-pao-kpao1770033-PAO X-Cache: MISS X-Cache-Hits: 0 X-Timer: S1767242719.310748,VS0,VE104 Vary: Accept-Encoding X-Fastly-Request-ID: 9b3889d5e59fe2f55f736198c1a9b9dca40223d2 Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 185.199.108.153:443 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 200 OK Connection: close Content-Length: 701 Server: GitHub.com Content-Type: text/html; charset=utf-8 Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT Access-Control-Allow-Origin: * Strict-Transport-Security: max-age=31556952 ETag: "6953eddf-2bd" expires: Thu, 01 Jan 2026 04:55:19 GMT Cache-Control: max-age=600 x-proxy-cache: MISS X-GitHub-Request-Id: 9C5A:83D7F:AB47E82:ADA5B1E:6955FBDF Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-fra-eddf8230186-FRA X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.252429,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: 7cc494f32671fd6969e05e309f309dd65911f355 Page title: Obfuscator.io Deobfuscator <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
Open service 185.199.109.153:443 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 200 OK Connection: close Content-Length: 701 Server: GitHub.com Content-Type: text/html; charset=utf-8 Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT Access-Control-Allow-Origin: * Strict-Transport-Security: max-age=31556952 ETag: "6953eddf-2bd" expires: Thu, 01 Jan 2026 04:55:19 GMT Cache-Control: max-age=600 x-proxy-cache: MISS X-GitHub-Request-Id: 9C5A:83D7F:AB47E82:ADA5B1E:6955FBDF Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-fra-eddf8230137-FRA X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.251730,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: 655b44f8d8b6fd35bf5de0ca5be67a76a478ccfe Page title: Obfuscator.io Deobfuscator <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
Open service 2606:50c0:8002::153:80 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://obf-io.deobfuscate.io/ X-GitHub-Request-Id: CD4A:28320D:3761ED0:3B7EFAB:6955FBDE Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-yyz4535-YYZ X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.163732,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: 1dea096196f033ee180b03b2ae0cc47e758a3439 Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 2606:50c0:8001::153:80 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://obf-io.deobfuscate.io/ X-GitHub-Request-Id: 79DE:2368DD:ABE527A:AE4C124:6955FBDF Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-rtm-ehrd2290028-RTM X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.214388,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: 3ea9ad89070b685553c428df8822f90c2dc4796e Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 2606:50c0:8000::153:80 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://obf-io.deobfuscate.io/ X-GitHub-Request-Id: 79DE:2368DD:ABE527A:AE4C124:6955FBDF Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-rtm-ehrd2290054-RTM X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.213696,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: ac647543ca0b59726bf3652e74e3ceb1e5432c56 Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 185.199.110.153:443 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 200 OK Connection: close Content-Length: 701 Server: GitHub.com Content-Type: text/html; charset=utf-8 Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT Access-Control-Allow-Origin: * Strict-Transport-Security: max-age=31556952 ETag: "6953eddf-2bd" expires: Thu, 01 Jan 2026 04:55:19 GMT Cache-Control: max-age=600 x-proxy-cache: MISS X-GitHub-Request-Id: 9457:28320D:3761EC5:3B7EFA3:6955FBDE Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-yyz4547-YYZ X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.147408,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: 34c2aec2b93e61dbfb517772e007f0cc88ace6de Page title: Obfuscator.io Deobfuscator <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
Open service 2606:50c0:8003::153:80 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://obf-io.deobfuscate.io/ X-GitHub-Request-Id: FE26:2ED019:895DEA4:95937BB:6955FBDE Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-lga21968-LGA X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.104303,VS0,VE2 Vary: Accept-Encoding X-Fastly-Request-ID: 7af2482a2c304fbd80730ef913aaff04c395192b Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 2606:50c0:8001::153:443 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 200 OK Connection: close Content-Length: 701 Server: GitHub.com Content-Type: text/html; charset=utf-8 Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT Access-Control-Allow-Origin: * Strict-Transport-Security: max-age=31556952 ETag: "6953eddf-2bd" expires: Thu, 01 Jan 2026 04:55:19 GMT Cache-Control: max-age=600 x-proxy-cache: MISS X-GitHub-Request-Id: 7C52:35C252:2EF2781:330881B:6955FBDF Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-lga21987-LGA X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.118967,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: a93b49523c0204c21c80bf4c7d0ddc2c3fdfb69b Page title: Obfuscator.io Deobfuscator <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
Open service 185.199.110.153:80 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://obf-io.deobfuscate.io/ X-GitHub-Request-Id: FE26:2ED019:895DEA4:95937BB:6955FBDE Accept-Ranges: bytes Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-lga21987-LGA X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1767242719.108407,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: cb0a048c061a44509aa0eadf69a83bb4e9ece955 Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 185.199.108.153:80 · obf-io.deobfuscate.io
2026-01-01 04:45
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html x-origin-cache: HIT Location: https://obf-io.deobfuscate.io/ X-GitHub-Request-Id: A23E:1E8009:4DE1EAD:4F512E3:6955FBDE Accept-Ranges: bytes Age: 0 Date: Thu, 01 Jan 2026 04:45:19 GMT Via: 1.1 varnish X-Served-By: cache-lon4255-LON X-Cache: MISS X-Cache-Hits: 0 X-Timer: S1767242719.111652,VS0,VE83 Vary: Accept-Encoding X-Fastly-Request-ID: 5ae08a615c397203c5f5ed203db0e475fde17146 Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 76.76.21.93:443 · landing.deobfuscate.io
2025-12-22 14:29
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Origin: *
Age: 3714145
Cache-Control: public, max-age=0, must-revalidate
Content-Disposition: inline
Content-Length: 25775
Content-Type: text/html; charset=utf-8
Date: Mon, 22 Dec 2025 14:29:09 GMT
Etag: "749f0124d9636f80f63aa84b4cc5aa3e"
Last-Modified: Sun, 09 Nov 2025 14:46:43 GMT
Server: Vercel
Strict-Transport-Security: max-age=63072000
X-Matched-Path: /
X-Vercel-Cache: HIT
X-Vercel-Id: iad1::b92gn-1766413749424-6e4cac8e3be5
Connection: close
Page title: Ocule
<!DOCTYPE html><html><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><title>Ocule</title><meta name="next-head-count" content="3"/><link rel="preconnect" href="https://fonts.googleapis.com"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin=""/><link rel="icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-32x32.png" sizes="32x32"/><link rel="icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-192x192.png" sizes="192x192"/><link rel="apple-touch-icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-180x180.png"/><meta name="msapplication-TileImage" content="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-270x270.png"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin /><link rel="preload" href="/_next/static/css/fa11c86712184e0a.css" as="style"/><link rel="stylesheet" href="/_next/static/css/fa11c86712184e0a.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/_next/static/chunks/webpack-8fa1640cc84ba8fe.js" defer=""></script><script src="/_next/static/chunks/framework-2c79e2a64abdb08b.js" defer=""></script><script src="/_next/static/chunks/main-dfccacc1cfe3cbfe.js" defer=""></script><script src="/_next/static/chunks/pages/_app-b0cf226e842d891d.js" defer=""></script><script src="/_next/static/chunks/pages/index-93802a9fe876664f.js" defer=""></script><script src="/_next/static/2w-woMOULRXUFbTzhXknU/_buildManifest.js" defer=""></script><script src="/_next/static/2w-woMOULRXUFbTzhXknU/_ssgManifest.js" defer=""></script><style data-href="https://fonts.googleapis.com/css2?family=Roboto:wght@100;300;400;500;700;900&display=swap">@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgWxM.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:300;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmSU5vAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:400;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOmCnqEu92Fr1Me5g.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:500;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmEU9vAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:700;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmWUlvAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:900;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmYUtvAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxFIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0460-052F,U+1C80-1C88,U+20B4,U+2DE0-2DFF,U+A640-A69F,U+FE2E-FE2F}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxMIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0301,U+0400-045F,U+0490-0491,U+04B0-04B1,U+2116}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxEIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+1F00-1FFF}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxLIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0370-03FF}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/
Open service 66.33.60.194:80 · landing.deobfuscate.io
2025-12-22 14:29
HTTP/1.0 308 Permanent Redirect Content-Type: text/plain Location: https://landing.deobfuscate.io/ Refresh: 0;url=https://landing.deobfuscate.io/ server: Vercel Redirecting...
Open service 76.76.21.93:80 · landing.deobfuscate.io
2025-12-22 14:29
HTTP/1.0 308 Permanent Redirect Content-Type: text/plain Location: https://landing.deobfuscate.io/ Refresh: 0;url=https://landing.deobfuscate.io/ server: Vercel Redirecting...
Open service 66.33.60.194:443 · landing.deobfuscate.io
2025-12-22 14:29
HTTP/1.1 200 OK
Accept-Ranges: bytes
Access-Control-Allow-Origin: *
Age: 3714145
Cache-Control: public, max-age=0, must-revalidate
Content-Disposition: inline
Content-Length: 25775
Content-Type: text/html; charset=utf-8
Date: Mon, 22 Dec 2025 14:29:09 GMT
Etag: "749f0124d9636f80f63aa84b4cc5aa3e"
Last-Modified: Sun, 09 Nov 2025 14:46:43 GMT
Server: Vercel
Strict-Transport-Security: max-age=63072000
X-Matched-Path: /
X-Vercel-Cache: HIT
X-Vercel-Id: iad1::nrp89-1766413749377-2c34d3494467
Connection: close
Page title: Ocule
<!DOCTYPE html><html><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><title>Ocule</title><meta name="next-head-count" content="3"/><link rel="preconnect" href="https://fonts.googleapis.com"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin=""/><link rel="icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-32x32.png" sizes="32x32"/><link rel="icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-192x192.png" sizes="192x192"/><link rel="apple-touch-icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-180x180.png"/><meta name="msapplication-TileImage" content="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-270x270.png"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin /><link rel="preload" href="/_next/static/css/fa11c86712184e0a.css" as="style"/><link rel="stylesheet" href="/_next/static/css/fa11c86712184e0a.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/_next/static/chunks/webpack-8fa1640cc84ba8fe.js" defer=""></script><script src="/_next/static/chunks/framework-2c79e2a64abdb08b.js" defer=""></script><script src="/_next/static/chunks/main-dfccacc1cfe3cbfe.js" defer=""></script><script src="/_next/static/chunks/pages/_app-b0cf226e842d891d.js" defer=""></script><script src="/_next/static/chunks/pages/index-93802a9fe876664f.js" defer=""></script><script src="/_next/static/2w-woMOULRXUFbTzhXknU/_buildManifest.js" defer=""></script><script src="/_next/static/2w-woMOULRXUFbTzhXknU/_ssgManifest.js" defer=""></script><style data-href="https://fonts.googleapis.com/css2?family=Roboto:wght@100;300;400;500;700;900&display=swap">@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgWxM.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:300;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmSU5vAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:400;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOmCnqEu92Fr1Me5g.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:500;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmEU9vAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:700;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmWUlvAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:900;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmYUtvAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxFIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0460-052F,U+1C80-1C88,U+20B4,U+2DE0-2DFF,U+A640-A69F,U+FE2E-FE2F}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxMIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0301,U+0400-045F,U+0490-0491,U+04B0-04B1,U+2116}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxEIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+1F00-1FFF}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxLIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0370-03FF}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/
Open service 185.199.109.153:443 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 200 OK
Connection: close
Content-Length: 5023
Server: GitHub.com
Content-Type: text/html; charset=utf-8
Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
Access-Control-Allow-Origin: *
ETag: "67b79d0f-139f"
expires: Mon, 22 Dec 2025 06:59:54 GMT
Cache-Control: max-age=600
x-proxy-cache: MISS
X-GitHub-Request-Id: 36BE:1E1694:B8AF39:C9603B:6948EA12
Accept-Ranges: bytes
Date: Mon, 22 Dec 2025 06:49:54 GMT
Via: 1.1 varnish
Age: 0
X-Served-By: cache-lga21977-LGA
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1766386195.720266,VS0,VE1
Vary: Accept-Encoding
X-Fastly-Request-ID: 6c8a7225e5f5c1b55e4a3d1c6a716be602f16522
Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
<meta name="generator" content="Jekyll" />
<link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
<title>Reverse Engineering Blog</title>
<link rel="stylesheet" href="/css/main.css">
<link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
<!-- Begin Jekyll SEO tag v2.8.0 -->
<title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
<meta name="generator" content="Jekyll v3.10.0" />
<meta property="og:title" content="Reverse Engineering Blog" />
<meta name="author" content="ben-sb" />
<meta property="og:locale" content="en_US" />
<meta name="description" content="A blog covering reverse engineering and related topics." />
<meta property="og:description" content="A blog covering reverse engineering and related topics." />
<link rel="canonical" href="https://blog.deobfuscate.io/" />
<meta property="og:url" content="https://blog.deobfuscate.io/" />
<meta property="og:site_name" content="Reverse Engineering Blog" />
<meta property="og:type" content="website" />
<link rel="next" href="https://blog.deobfuscate.io/page/2/" />
<meta name="twitter:card" content="summary" />
<meta property="twitter:title" content="Reverse Engineering Blog" />
<script type="application/ld+json">
{"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
<!-- End Jekyll SEO tag -->
</head>
<body>
<div id="wrapper">
<header>
<div>
<a href="/">
<h1>ben-sb@home:~$</h1>
</a>
<div class="header-links">
<a href="/posts"><h2 class="header-link">Posts</h2></a>
<a href="/about"><h2 class="header-link">About</h2></a>
</div>
</div>
</header>
<div class="container">
<section id="main_content">
<ul>
<li>
<h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
<time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
<p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
</li>
<li>
<h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
<time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
<p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
</li>
<li>
<h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
<time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
<p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
</li>
<li>
<h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
<time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
<p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
Open service 2606:50c0:8000::153:443 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 200 OK
Connection: close
Content-Length: 5023
Server: GitHub.com
Content-Type: text/html; charset=utf-8
x-origin-cache: HIT
Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
Access-Control-Allow-Origin: *
ETag: "67b79d0f-139f"
expires: Mon, 22 Dec 2025 06:59:54 GMT
Cache-Control: max-age=600
x-proxy-cache: MISS
X-GitHub-Request-Id: B126:3F0015:B7B04C:C86565:6948EA12
Accept-Ranges: bytes
Date: Mon, 22 Dec 2025 06:49:54 GMT
Via: 1.1 varnish
Age: 0
X-Served-By: cache-yyz4553-YYZ
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1766386195.694820,VS0,VE1
Vary: Accept-Encoding
X-Fastly-Request-ID: 8a39fd478449837a30bc4672592f2e90d122ada7
Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
<meta name="generator" content="Jekyll" />
<link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
<title>Reverse Engineering Blog</title>
<link rel="stylesheet" href="/css/main.css">
<link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
<!-- Begin Jekyll SEO tag v2.8.0 -->
<title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
<meta name="generator" content="Jekyll v3.10.0" />
<meta property="og:title" content="Reverse Engineering Blog" />
<meta name="author" content="ben-sb" />
<meta property="og:locale" content="en_US" />
<meta name="description" content="A blog covering reverse engineering and related topics." />
<meta property="og:description" content="A blog covering reverse engineering and related topics." />
<link rel="canonical" href="https://blog.deobfuscate.io/" />
<meta property="og:url" content="https://blog.deobfuscate.io/" />
<meta property="og:site_name" content="Reverse Engineering Blog" />
<meta property="og:type" content="website" />
<link rel="next" href="https://blog.deobfuscate.io/page/2/" />
<meta name="twitter:card" content="summary" />
<meta property="twitter:title" content="Reverse Engineering Blog" />
<script type="application/ld+json">
{"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
<!-- End Jekyll SEO tag -->
</head>
<body>
<div id="wrapper">
<header>
<div>
<a href="/">
<h1>ben-sb@home:~$</h1>
</a>
<div class="header-links">
<a href="/posts"><h2 class="header-link">Posts</h2></a>
<a href="/about"><h2 class="header-link">About</h2></a>
</div>
</div>
</header>
<div class="container">
<section id="main_content">
<ul>
<li>
<h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
<time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
<p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
</li>
<li>
<h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
<time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
<p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
</li>
<li>
<h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
<time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
<p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
</li>
<li>
<h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
<time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
<p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
Open service 2606:50c0:8001::153:443 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 200 OK
Connection: close
Content-Length: 5023
Server: GitHub.com
Content-Type: text/html; charset=utf-8
Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
Access-Control-Allow-Origin: *
ETag: "67b79d0f-139f"
expires: Mon, 22 Dec 2025 06:59:54 GMT
Cache-Control: max-age=600
x-proxy-cache: MISS
X-GitHub-Request-Id: 29CF:1711E2:11CE9B7:122C4F5:6948EA12
Accept-Ranges: bytes
Date: Mon, 22 Dec 2025 06:49:54 GMT
Via: 1.1 varnish
Age: 0
X-Served-By: cache-lcy-egml8630081-LCY
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1766386195.744582,VS0,VE1
Vary: Accept-Encoding
X-Fastly-Request-ID: e4a68f314ac8d09eb40f9de35b599395f6a40405
Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
<meta name="generator" content="Jekyll" />
<link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
<title>Reverse Engineering Blog</title>
<link rel="stylesheet" href="/css/main.css">
<link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
<!-- Begin Jekyll SEO tag v2.8.0 -->
<title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
<meta name="generator" content="Jekyll v3.10.0" />
<meta property="og:title" content="Reverse Engineering Blog" />
<meta name="author" content="ben-sb" />
<meta property="og:locale" content="en_US" />
<meta name="description" content="A blog covering reverse engineering and related topics." />
<meta property="og:description" content="A blog covering reverse engineering and related topics." />
<link rel="canonical" href="https://blog.deobfuscate.io/" />
<meta property="og:url" content="https://blog.deobfuscate.io/" />
<meta property="og:site_name" content="Reverse Engineering Blog" />
<meta property="og:type" content="website" />
<link rel="next" href="https://blog.deobfuscate.io/page/2/" />
<meta name="twitter:card" content="summary" />
<meta property="twitter:title" content="Reverse Engineering Blog" />
<script type="application/ld+json">
{"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
<!-- End Jekyll SEO tag -->
</head>
<body>
<div id="wrapper">
<header>
<div>
<a href="/">
<h1>ben-sb@home:~$</h1>
</a>
<div class="header-links">
<a href="/posts"><h2 class="header-link">Posts</h2></a>
<a href="/about"><h2 class="header-link">About</h2></a>
</div>
</div>
</header>
<div class="container">
<section id="main_content">
<ul>
<li>
<h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
<time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
<p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
</li>
<li>
<h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
<time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
<p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
</li>
<li>
<h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
<time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
<p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
</li>
<li>
<h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
<time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
<p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
Open service 2606:50c0:8002::153:80 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://blog.deobfuscate.io/ X-GitHub-Request-Id: 0FC3:2FF8EC:2E3F6E5:2EE7538:6948EA0A Accept-Ranges: bytes Date: Mon, 22 Dec 2025 06:49:54 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-fra-eddf8230094-FRA X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1766386195.701306,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: 6418ee2ce3663efeac2d903f3d7e0c27ca6787af Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 185.199.110.153:443 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 200 OK
Connection: close
Content-Length: 5023
Server: GitHub.com
Content-Type: text/html; charset=utf-8
x-origin-cache: HIT
Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
Access-Control-Allow-Origin: *
ETag: "67b79d0f-139f"
expires: Mon, 22 Dec 2025 06:59:54 GMT
Cache-Control: max-age=600
x-proxy-cache: MISS
X-GitHub-Request-Id: 0CEC:2FF8EC:2E3F6EA:2EE753D:6948EA12
Accept-Ranges: bytes
Date: Mon, 22 Dec 2025 06:49:54 GMT
Via: 1.1 varnish
Age: 0
X-Served-By: cache-fra-eddf8230134-FRA
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1766386195.722945,VS0,VE1
Vary: Accept-Encoding
X-Fastly-Request-ID: 4648ed40f029ecdab7a16368f7478e43ef05fd26
Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
<meta name="generator" content="Jekyll" />
<link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
<title>Reverse Engineering Blog</title>
<link rel="stylesheet" href="/css/main.css">
<link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
<!-- Begin Jekyll SEO tag v2.8.0 -->
<title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
<meta name="generator" content="Jekyll v3.10.0" />
<meta property="og:title" content="Reverse Engineering Blog" />
<meta name="author" content="ben-sb" />
<meta property="og:locale" content="en_US" />
<meta name="description" content="A blog covering reverse engineering and related topics." />
<meta property="og:description" content="A blog covering reverse engineering and related topics." />
<link rel="canonical" href="https://blog.deobfuscate.io/" />
<meta property="og:url" content="https://blog.deobfuscate.io/" />
<meta property="og:site_name" content="Reverse Engineering Blog" />
<meta property="og:type" content="website" />
<link rel="next" href="https://blog.deobfuscate.io/page/2/" />
<meta name="twitter:card" content="summary" />
<meta property="twitter:title" content="Reverse Engineering Blog" />
<script type="application/ld+json">
{"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
<!-- End Jekyll SEO tag -->
</head>
<body>
<div id="wrapper">
<header>
<div>
<a href="/">
<h1>ben-sb@home:~$</h1>
</a>
<div class="header-links">
<a href="/posts"><h2 class="header-link">Posts</h2></a>
<a href="/about"><h2 class="header-link">About</h2></a>
</div>
</div>
</header>
<div class="container">
<section id="main_content">
<ul>
<li>
<h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
<time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
<p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
</li>
<li>
<h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
<time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
<p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
</li>
<li>
<h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
<time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
<p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
</li>
<li>
<h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
<time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
<p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
Open service 185.199.109.153:80 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://blog.deobfuscate.io/ X-GitHub-Request-Id: 9BA2:31C5C1:B81A44:C8C280:6948EA11 Accept-Ranges: bytes Date: Mon, 22 Dec 2025 06:49:54 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-lga21938-LGA X-Cache: HIT X-Cache-Hits: 2 X-Timer: S1766386195.659563,VS0,VE0 Vary: Accept-Encoding X-Fastly-Request-ID: c8e09b1a4e0d5fb536d6cddfeceb2157ac732dad Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 185.199.108.153:443 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 200 OK
Connection: close
Content-Length: 5023
Server: GitHub.com
Content-Type: text/html; charset=utf-8
Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
Access-Control-Allow-Origin: *
ETag: "67b79d0f-139f"
expires: Mon, 22 Dec 2025 06:59:54 GMT
Cache-Control: max-age=600
x-proxy-cache: MISS
X-GitHub-Request-Id: 9B3C:1711E2:11CE9BC:122C4FD:6948EA12
Accept-Ranges: bytes
Age: 0
Date: Mon, 22 Dec 2025 06:49:54 GMT
Via: 1.1 varnish
X-Served-By: cache-lon4242-LON
X-Cache: MISS
X-Cache-Hits: 0
X-Timer: S1766386195.743678,VS0,VE98
Vary: Accept-Encoding
X-Fastly-Request-ID: 7b5319cb93ca8ebccac0db4c3409b650a641fff2
Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
<meta name="generator" content="Jekyll" />
<link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
<title>Reverse Engineering Blog</title>
<link rel="stylesheet" href="/css/main.css">
<link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
<!-- Begin Jekyll SEO tag v2.8.0 -->
<title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
<meta name="generator" content="Jekyll v3.10.0" />
<meta property="og:title" content="Reverse Engineering Blog" />
<meta name="author" content="ben-sb" />
<meta property="og:locale" content="en_US" />
<meta name="description" content="A blog covering reverse engineering and related topics." />
<meta property="og:description" content="A blog covering reverse engineering and related topics." />
<link rel="canonical" href="https://blog.deobfuscate.io/" />
<meta property="og:url" content="https://blog.deobfuscate.io/" />
<meta property="og:site_name" content="Reverse Engineering Blog" />
<meta property="og:type" content="website" />
<link rel="next" href="https://blog.deobfuscate.io/page/2/" />
<meta name="twitter:card" content="summary" />
<meta property="twitter:title" content="Reverse Engineering Blog" />
<script type="application/ld+json">
{"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
<!-- End Jekyll SEO tag -->
</head>
<body>
<div id="wrapper">
<header>
<div>
<a href="/">
<h1>ben-sb@home:~$</h1>
</a>
<div class="header-links">
<a href="/posts"><h2 class="header-link">Posts</h2></a>
<a href="/about"><h2 class="header-link">About</h2></a>
</div>
</div>
</header>
<div class="container">
<section id="main_content">
<ul>
<li>
<h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
<time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
<p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
</li>
<li>
<h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
<time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
<p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
</li>
<li>
<h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
<time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
<p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
</li>
<li>
<h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
<time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
<p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
Open service 2606:50c0:8002::153:443 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 200 OK
Connection: close
Content-Length: 5023
Server: GitHub.com
Content-Type: text/html; charset=utf-8
Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
Access-Control-Allow-Origin: *
ETag: "67b79d0f-139f"
expires: Mon, 22 Dec 2025 06:59:54 GMT
Cache-Control: max-age=600
x-proxy-cache: MISS
X-GitHub-Request-Id: 36BE:1E1694:B8AF39:C9603B:6948EA12
Accept-Ranges: bytes
Date: Mon, 22 Dec 2025 06:49:54 GMT
Via: 1.1 varnish
Age: 0
X-Served-By: cache-lga21949-LGA
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1766386195.681543,VS0,VE1
Vary: Accept-Encoding
X-Fastly-Request-ID: d43bb64a28df084388e76e7e79ff88c5f895dba8
Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
<meta name="generator" content="Jekyll" />
<link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
<title>Reverse Engineering Blog</title>
<link rel="stylesheet" href="/css/main.css">
<link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
<!-- Begin Jekyll SEO tag v2.8.0 -->
<title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
<meta name="generator" content="Jekyll v3.10.0" />
<meta property="og:title" content="Reverse Engineering Blog" />
<meta name="author" content="ben-sb" />
<meta property="og:locale" content="en_US" />
<meta name="description" content="A blog covering reverse engineering and related topics." />
<meta property="og:description" content="A blog covering reverse engineering and related topics." />
<link rel="canonical" href="https://blog.deobfuscate.io/" />
<meta property="og:url" content="https://blog.deobfuscate.io/" />
<meta property="og:site_name" content="Reverse Engineering Blog" />
<meta property="og:type" content="website" />
<link rel="next" href="https://blog.deobfuscate.io/page/2/" />
<meta name="twitter:card" content="summary" />
<meta property="twitter:title" content="Reverse Engineering Blog" />
<script type="application/ld+json">
{"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
<!-- End Jekyll SEO tag -->
</head>
<body>
<div id="wrapper">
<header>
<div>
<a href="/">
<h1>ben-sb@home:~$</h1>
</a>
<div class="header-links">
<a href="/posts"><h2 class="header-link">Posts</h2></a>
<a href="/about"><h2 class="header-link">About</h2></a>
</div>
</div>
</header>
<div class="container">
<section id="main_content">
<ul>
<li>
<h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
<time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
<p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
</li>
<li>
<h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
<time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
<p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
</li>
<li>
<h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
<time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
<p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
</li>
<li>
<h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
<time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
<p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
Open service 2606:50c0:8003::153:80 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://blog.deobfuscate.io/ X-GitHub-Request-Id: 9BA2:31C5C1:B81A44:C8C280:6948EA11 Accept-Ranges: bytes Date: Mon, 22 Dec 2025 06:49:54 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-lga21946-LGA X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1766386195.639540,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: a49be76884d6ee7966dbcfded0ef1135df41bfb5 Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 185.199.108.153:80 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://blog.deobfuscate.io/ X-GitHub-Request-Id: 3CA2:1C5F94:11CC71F:122A2C5:6948EA09 Accept-Ranges: bytes Age: 0 Date: Mon, 22 Dec 2025 06:49:54 GMT Via: 1.1 varnish X-Served-By: cache-lon420146-LON X-Cache: MISS X-Cache-Hits: 0 X-Timer: S1766386195.714316,VS0,VE90 Vary: Accept-Encoding X-Fastly-Request-ID: a23a27434569b0104b54effa7299cf947cc6382d Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 185.199.111.153:443 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 200 OK
Connection: close
Content-Length: 5023
Server: GitHub.com
Content-Type: text/html; charset=utf-8
x-origin-cache: HIT
Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
Access-Control-Allow-Origin: *
ETag: "67b79d0f-139f"
expires: Mon, 22 Dec 2025 06:59:54 GMT
Cache-Control: max-age=600
x-proxy-cache: MISS
X-GitHub-Request-Id: 0CEC:2FF8EC:2E3F6EA:2EE753D:6948EA12
Accept-Ranges: bytes
Date: Mon, 22 Dec 2025 06:49:54 GMT
Via: 1.1 varnish
Age: 0
X-Served-By: cache-fra-eddf8230118-FRA
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1766386195.725551,VS0,VE1
Vary: Accept-Encoding
X-Fastly-Request-ID: d513ba9bfd0fed02f0f3e16d2417516bf8f21a21
Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
<meta name="generator" content="Jekyll" />
<link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
<title>Reverse Engineering Blog</title>
<link rel="stylesheet" href="/css/main.css">
<link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
<!-- Begin Jekyll SEO tag v2.8.0 -->
<title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
<meta name="generator" content="Jekyll v3.10.0" />
<meta property="og:title" content="Reverse Engineering Blog" />
<meta name="author" content="ben-sb" />
<meta property="og:locale" content="en_US" />
<meta name="description" content="A blog covering reverse engineering and related topics." />
<meta property="og:description" content="A blog covering reverse engineering and related topics." />
<link rel="canonical" href="https://blog.deobfuscate.io/" />
<meta property="og:url" content="https://blog.deobfuscate.io/" />
<meta property="og:site_name" content="Reverse Engineering Blog" />
<meta property="og:type" content="website" />
<link rel="next" href="https://blog.deobfuscate.io/page/2/" />
<meta name="twitter:card" content="summary" />
<meta property="twitter:title" content="Reverse Engineering Blog" />
<script type="application/ld+json">
{"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
<!-- End Jekyll SEO tag -->
</head>
<body>
<div id="wrapper">
<header>
<div>
<a href="/">
<h1>ben-sb@home:~$</h1>
</a>
<div class="header-links">
<a href="/posts"><h2 class="header-link">Posts</h2></a>
<a href="/about"><h2 class="header-link">About</h2></a>
</div>
</div>
</header>
<div class="container">
<section id="main_content">
<ul>
<li>
<h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
<time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
<p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
</li>
<li>
<h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
<time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
<p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
</li>
<li>
<h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
<time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
<p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
</li>
<li>
<h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
<time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
<p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
Open service 185.199.111.153:80 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html x-origin-cache: HIT Location: https://blog.deobfuscate.io/ X-GitHub-Request-Id: DA8F:101C97:2D80BFC:2E2A9E5:6948EA11 Accept-Ranges: bytes Age: 0 Date: Mon, 22 Dec 2025 06:49:54 GMT Via: 1.1 varnish X-Served-By: cache-vie6323-VIE X-Cache: MISS X-Cache-Hits: 0 X-Timer: S1766386195.723173,VS0,VE98 Vary: Accept-Encoding X-Fastly-Request-ID: ba6ded0a16cf0cc9cbe6fec084851dd005d89897 Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 2606:50c0:8003::153:443 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 200 OK
Connection: close
Content-Length: 5023
Server: GitHub.com
Content-Type: text/html; charset=utf-8
x-origin-cache: HIT
Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
Access-Control-Allow-Origin: *
ETag: "67b79d0f-139f"
expires: Mon, 22 Dec 2025 06:59:54 GMT
Cache-Control: max-age=600
x-proxy-cache: MISS
X-GitHub-Request-Id: B126:3F0015:B7B04C:C86565:6948EA12
Accept-Ranges: bytes
Date: Mon, 22 Dec 2025 06:49:54 GMT
Via: 1.1 varnish
Age: 0
X-Served-By: cache-yyz4560-YYZ
X-Cache: HIT
X-Cache-Hits: 1
X-Timer: S1766386195.615177,VS0,VE1
Vary: Accept-Encoding
X-Fastly-Request-ID: 3b30ffe2e12d60ae6a5746a17220a6fb640677d0
Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
<meta name="generator" content="Jekyll" />
<link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
<title>Reverse Engineering Blog</title>
<link rel="stylesheet" href="/css/main.css">
<link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
<!-- Begin Jekyll SEO tag v2.8.0 -->
<title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
<meta name="generator" content="Jekyll v3.10.0" />
<meta property="og:title" content="Reverse Engineering Blog" />
<meta name="author" content="ben-sb" />
<meta property="og:locale" content="en_US" />
<meta name="description" content="A blog covering reverse engineering and related topics." />
<meta property="og:description" content="A blog covering reverse engineering and related topics." />
<link rel="canonical" href="https://blog.deobfuscate.io/" />
<meta property="og:url" content="https://blog.deobfuscate.io/" />
<meta property="og:site_name" content="Reverse Engineering Blog" />
<meta property="og:type" content="website" />
<link rel="next" href="https://blog.deobfuscate.io/page/2/" />
<meta name="twitter:card" content="summary" />
<meta property="twitter:title" content="Reverse Engineering Blog" />
<script type="application/ld+json">
{"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
<!-- End Jekyll SEO tag -->
</head>
<body>
<div id="wrapper">
<header>
<div>
<a href="/">
<h1>ben-sb@home:~$</h1>
</a>
<div class="header-links">
<a href="/posts"><h2 class="header-link">Posts</h2></a>
<a href="/about"><h2 class="header-link">About</h2></a>
</div>
</div>
</header>
<div class="container">
<section id="main_content">
<ul>
<li>
<h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
<time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
<p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
</li>
<li>
<h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
<time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
<p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
</li>
<li>
<h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
<time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
<p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
</li>
<li>
<h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
<time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
<p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
Open service 2606:50c0:8001::153:80 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://blog.deobfuscate.io/ X-GitHub-Request-Id: E438:255727:BBC66D:CC6807:6948EA12 Accept-Ranges: bytes Date: Mon, 22 Dec 2025 06:49:54 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-yyz4529-YYZ X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1766386195.551140,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: bdfd88edbeea7b750361514f0ac7d9c3e5a57c5b Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 185.199.110.153:80 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://blog.deobfuscate.io/ X-GitHub-Request-Id: 9BA2:31C5C1:B81A44:C8C280:6948EA11 Accept-Ranges: bytes Date: Mon, 22 Dec 2025 06:49:54 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-lga21925-LGA X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1766386195.555080,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: 7c24e4db800d1dc8df0f7183c7d2ac541b8d1b60 Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 2606:50c0:8000::153:80 · blog.deobfuscate.io
2025-12-22 06:49
HTTP/1.1 301 Moved Permanently Connection: close Content-Length: 162 Server: GitHub.com Content-Type: text/html Location: https://blog.deobfuscate.io/ X-GitHub-Request-Id: E438:255727:BBC66D:CC6807:6948EA12 Accept-Ranges: bytes Date: Mon, 22 Dec 2025 06:49:54 GMT Via: 1.1 varnish Age: 0 X-Served-By: cache-yyz4545-YYZ X-Cache: HIT X-Cache-Hits: 1 X-Timer: S1766386195.542180,VS0,VE1 Vary: Accept-Encoding X-Fastly-Request-ID: acb6e709dfe80d20150baf49978a4c6dcf18251d Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>