Domain deobfuscate.io
United States
AMAZON-02
Software information

GitHub.com

tcp/443 tcp/80

Heroku

tcp/443 tcp/80

Vercel

tcp/443 tcp/80

  • Open service 99.83.151.71:443 · deobfuscate.io

    2026-01-13 00:23

    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Access-Control-Allow-Credentials: true
    Access-Control-Allow-Origin: https://deobfuscate.io
    Cache-Control: public, max-age=0
    Content-Length: 20584
    Content-Type: text/html; charset=UTF-8
    Date: Tue, 13 Jan 2026 00:23:49 GMT
    Etag: W/"5068-19ba9b39bd8"
    Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
    Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
    Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263829"}],"max_age":3600}
    Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263829"
    Server: Heroku
    Vary: Origin
    Via: 1.1 heroku-router
    X-Powered-By: Express
    Connection: close
    
    Page title: JavaScript Deobfuscator
    
    <!DOCTYPE html>
    <html lang="en">
      <head>
        <!-- Meta Data -->
        <title>JavaScript Deobfuscator</title>
        <meta charset="utf-8" />
        <meta
          name="description"
          content="A simple but powerful deobfuscator to remove common JavaScript
        obfuscation techniques"
        />
        <meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
        <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
        <link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
    
        <!-- Google tag (gtag.js) -->
        <script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
        <script>
          window.dataLayer = window.dataLayer || [];
          function gtag() {
            dataLayer.push(arguments);
          }
          gtag('js', new Date());
    
          gtag('config', 'G-PK6YQBK0W0');
        </script>
    
        <script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
        <script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
        <script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
        <script>
          window.ezstandalone = window.ezstandalone || {};
          ezstandalone.cmd = ezstandalone.cmd || [];
    
          ezstandalone.cmd.push(function () {
            ezstandalone.showAds(103, 104);
          });
        </script>
        <meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
    
        <!-- Links-->
        <link rel="stylesheet" href="./assets/css/main.css" />
        <link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
        <link rel="icon" href="/favicon.ico" />
      </head>
      <body>
        <!-- Error popup modal -->
        <div
          id="errorPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="errorPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="errorPopupModal"
                class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
              >
                <div>
                  <div class="text-center">
                    <h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
                      Error
                    </h3>
                    <div class="mt-2">
                      <p class="text-sm text-gray-500">
                        There was an error deobfuscating your code. Check the console for more details.
                      </p>
                    </div>
                  </div>
                </div>
                <div class="mt-5">
                  <button
                    id="errorPopupConfirmButton"
                    type="button"
                    class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
                  >
                    Ok
                  </button>
                </div>
              </div>
            </div>
          </div>
        </div>
    
        <!-- Obfuscator.io popup modal -->
        <div
          id="obfIoPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="obfIoPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="obfIoPopupModal"
                class="popupModal relative transform overflow-hid
    Found 2 days ago by HttpPlugin
    Create report
  • Open service 75.2.97.79:80 · deobfuscate.io

    2026-01-13 00:23

    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Access-Control-Allow-Credentials: true
    Access-Control-Allow-Origin: https://deobfuscate.io
    Cache-Control: public, max-age=0
    Content-Length: 20584
    Content-Type: text/html; charset=UTF-8
    Date: Tue, 13 Jan 2026 00:24:51 GMT
    Etag: W/"5068-19ba9b39bd8"
    Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
    Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
    Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=VrBfrmv29t830AWVe4vdc%2B00VVGxyilTYzhlmZrPcbE%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263891"}],"max_age":3600}
    Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=VrBfrmv29t830AWVe4vdc%2B00VVGxyilTYzhlmZrPcbE%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263891"
    Server: Heroku
    Vary: Origin
    Via: 1.1 heroku-router
    X-Powered-By: Express
    Connection: close
    
    Page title: JavaScript Deobfuscator
    
    <!DOCTYPE html>
    <html lang="en">
      <head>
        <!-- Meta Data -->
        <title>JavaScript Deobfuscator</title>
        <meta charset="utf-8" />
        <meta
          name="description"
          content="A simple but powerful deobfuscator to remove common JavaScript
        obfuscation techniques"
        />
        <meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
        <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
        <link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
    
        <!-- Google tag (gtag.js) -->
        <script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
        <script>
          window.dataLayer = window.dataLayer || [];
          function gtag() {
            dataLayer.push(arguments);
          }
          gtag('js', new Date());
    
          gtag('config', 'G-PK6YQBK0W0');
        </script>
    
        <script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
        <script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
        <script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
        <script>
          window.ezstandalone = window.ezstandalone || {};
          ezstandalone.cmd = ezstandalone.cmd || [];
    
          ezstandalone.cmd.push(function () {
            ezstandalone.showAds(103, 104);
          });
        </script>
        <meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
    
        <!-- Links-->
        <link rel="stylesheet" href="./assets/css/main.css" />
        <link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
        <link rel="icon" href="/favicon.ico" />
      </head>
      <body>
        <!-- Error popup modal -->
        <div
          id="errorPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="errorPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="errorPopupModal"
                class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
              >
                <div>
                  <div class="text-center">
                    <h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
                      Error
                    </h3>
                    <div class="mt-2">
                      <p class="text-sm text-gray-500">
                        There was an error deobfuscating your code. Check the console for more details.
                      </p>
                    </div>
                  </div>
                </div>
                <div class="mt-5">
                  <button
                    id="errorPopupConfirmButton"
                    type="button"
                    class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
                  >
                    Ok
                  </button>
                </div>
              </div>
            </div>
          </div>
        </div>
    
        <!-- Obfuscator.io popup modal -->
        <div
          id="obfIoPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="obfIoPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="obfIoPopupModal"
                class="popupModal relative transform overflow-hid
    Found 2 days ago by HttpPlugin
    Create report
  • Open service 13.248.132.87:80 · deobfuscate.io

    2026-01-13 00:23

    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Access-Control-Allow-Credentials: true
    Access-Control-Allow-Origin: https://deobfuscate.io
    Cache-Control: public, max-age=0
    Content-Length: 20584
    Content-Type: text/html; charset=UTF-8
    Date: Tue, 13 Jan 2026 00:24:50 GMT
    Etag: W/"5068-19ba9b39bd8"
    Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
    Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
    Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263890"}],"max_age":3600}
    Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263890"
    Server: Heroku
    Vary: Origin
    Via: 1.1 heroku-router
    X-Powered-By: Express
    Connection: close
    
    Page title: JavaScript Deobfuscator
    
    <!DOCTYPE html>
    <html lang="en">
      <head>
        <!-- Meta Data -->
        <title>JavaScript Deobfuscator</title>
        <meta charset="utf-8" />
        <meta
          name="description"
          content="A simple but powerful deobfuscator to remove common JavaScript
        obfuscation techniques"
        />
        <meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
        <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
        <link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
    
        <!-- Google tag (gtag.js) -->
        <script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
        <script>
          window.dataLayer = window.dataLayer || [];
          function gtag() {
            dataLayer.push(arguments);
          }
          gtag('js', new Date());
    
          gtag('config', 'G-PK6YQBK0W0');
        </script>
    
        <script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
        <script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
        <script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
        <script>
          window.ezstandalone = window.ezstandalone || {};
          ezstandalone.cmd = ezstandalone.cmd || [];
    
          ezstandalone.cmd.push(function () {
            ezstandalone.showAds(103, 104);
          });
        </script>
        <meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
    
        <!-- Links-->
        <link rel="stylesheet" href="./assets/css/main.css" />
        <link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
        <link rel="icon" href="/favicon.ico" />
      </head>
      <body>
        <!-- Error popup modal -->
        <div
          id="errorPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="errorPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="errorPopupModal"
                class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
              >
                <div>
                  <div class="text-center">
                    <h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
                      Error
                    </h3>
                    <div class="mt-2">
                      <p class="text-sm text-gray-500">
                        There was an error deobfuscating your code. Check the console for more details.
                      </p>
                    </div>
                  </div>
                </div>
                <div class="mt-5">
                  <button
                    id="errorPopupConfirmButton"
                    type="button"
                    class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
                  >
                    Ok
                  </button>
                </div>
              </div>
            </div>
          </div>
        </div>
    
        <!-- Obfuscator.io popup modal -->
        <div
          id="obfIoPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="obfIoPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="obfIoPopupModal"
                class="popupModal relative transform overflow-hid
    Found 2 days ago by HttpPlugin
    Create report
  • Open service 35.71.145.101:443 · deobfuscate.io

    2026-01-13 00:23

    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Access-Control-Allow-Credentials: true
    Access-Control-Allow-Origin: https://deobfuscate.io
    Cache-Control: public, max-age=0
    Content-Length: 20584
    Content-Type: text/html; charset=UTF-8
    Date: Tue, 13 Jan 2026 00:23:49 GMT
    Etag: W/"5068-19ba9b39bd8"
    Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
    Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
    Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263829"}],"max_age":3600}
    Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263829"
    Server: Heroku
    Vary: Origin
    Via: 1.1 heroku-router
    X-Powered-By: Express
    Connection: close
    
    Page title: JavaScript Deobfuscator
    
    <!DOCTYPE html>
    <html lang="en">
      <head>
        <!-- Meta Data -->
        <title>JavaScript Deobfuscator</title>
        <meta charset="utf-8" />
        <meta
          name="description"
          content="A simple but powerful deobfuscator to remove common JavaScript
        obfuscation techniques"
        />
        <meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
        <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
        <link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
    
        <!-- Google tag (gtag.js) -->
        <script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
        <script>
          window.dataLayer = window.dataLayer || [];
          function gtag() {
            dataLayer.push(arguments);
          }
          gtag('js', new Date());
    
          gtag('config', 'G-PK6YQBK0W0');
        </script>
    
        <script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
        <script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
        <script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
        <script>
          window.ezstandalone = window.ezstandalone || {};
          ezstandalone.cmd = ezstandalone.cmd || [];
    
          ezstandalone.cmd.push(function () {
            ezstandalone.showAds(103, 104);
          });
        </script>
        <meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
    
        <!-- Links-->
        <link rel="stylesheet" href="./assets/css/main.css" />
        <link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
        <link rel="icon" href="/favicon.ico" />
      </head>
      <body>
        <!-- Error popup modal -->
        <div
          id="errorPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="errorPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="errorPopupModal"
                class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
              >
                <div>
                  <div class="text-center">
                    <h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
                      Error
                    </h3>
                    <div class="mt-2">
                      <p class="text-sm text-gray-500">
                        There was an error deobfuscating your code. Check the console for more details.
                      </p>
                    </div>
                  </div>
                </div>
                <div class="mt-5">
                  <button
                    id="errorPopupConfirmButton"
                    type="button"
                    class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
                  >
                    Ok
                  </button>
                </div>
              </div>
            </div>
          </div>
        </div>
    
        <!-- Obfuscator.io popup modal -->
        <div
          id="obfIoPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="obfIoPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="obfIoPopupModal"
                class="popupModal relative transform overflow-hid
    Found 2 days ago by HttpPlugin
    Create report
  • Open service 35.71.145.101:80 · deobfuscate.io

    2026-01-13 00:23

    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Access-Control-Allow-Credentials: true
    Access-Control-Allow-Origin: https://deobfuscate.io
    Cache-Control: public, max-age=0
    Content-Length: 20584
    Content-Type: text/html; charset=UTF-8
    Date: Tue, 13 Jan 2026 00:24:50 GMT
    Etag: W/"5068-19ba9b39bd8"
    Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
    Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
    Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263890"}],"max_age":3600}
    Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263890"
    Server: Heroku
    Vary: Origin
    Via: 1.1 heroku-router
    X-Powered-By: Express
    Connection: close
    
    Page title: JavaScript Deobfuscator
    
    <!DOCTYPE html>
    <html lang="en">
      <head>
        <!-- Meta Data -->
        <title>JavaScript Deobfuscator</title>
        <meta charset="utf-8" />
        <meta
          name="description"
          content="A simple but powerful deobfuscator to remove common JavaScript
        obfuscation techniques"
        />
        <meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
        <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
        <link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
    
        <!-- Google tag (gtag.js) -->
        <script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
        <script>
          window.dataLayer = window.dataLayer || [];
          function gtag() {
            dataLayer.push(arguments);
          }
          gtag('js', new Date());
    
          gtag('config', 'G-PK6YQBK0W0');
        </script>
    
        <script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
        <script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
        <script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
        <script>
          window.ezstandalone = window.ezstandalone || {};
          ezstandalone.cmd = ezstandalone.cmd || [];
    
          ezstandalone.cmd.push(function () {
            ezstandalone.showAds(103, 104);
          });
        </script>
        <meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
    
        <!-- Links-->
        <link rel="stylesheet" href="./assets/css/main.css" />
        <link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
        <link rel="icon" href="/favicon.ico" />
      </head>
      <body>
        <!-- Error popup modal -->
        <div
          id="errorPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="errorPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="errorPopupModal"
                class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
              >
                <div>
                  <div class="text-center">
                    <h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
                      Error
                    </h3>
                    <div class="mt-2">
                      <p class="text-sm text-gray-500">
                        There was an error deobfuscating your code. Check the console for more details.
                      </p>
                    </div>
                  </div>
                </div>
                <div class="mt-5">
                  <button
                    id="errorPopupConfirmButton"
                    type="button"
                    class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
                  >
                    Ok
                  </button>
                </div>
              </div>
            </div>
          </div>
        </div>
    
        <!-- Obfuscator.io popup modal -->
        <div
          id="obfIoPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="obfIoPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="obfIoPopupModal"
                class="popupModal relative transform overflow-hid
    Found 2 days ago by HttpPlugin
    Create report
  • Open service 13.248.132.87:443 · deobfuscate.io

    2026-01-13 00:23

    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Access-Control-Allow-Credentials: true
    Access-Control-Allow-Origin: https://deobfuscate.io
    Cache-Control: public, max-age=0
    Content-Length: 20584
    Content-Type: text/html; charset=UTF-8
    Date: Tue, 13 Jan 2026 00:23:49 GMT
    Etag: W/"5068-19ba9b39bd8"
    Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
    Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
    Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263829"}],"max_age":3600}
    Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263829"
    Server: Heroku
    Vary: Origin
    Via: 1.1 heroku-router
    X-Powered-By: Express
    Connection: close
    
    Page title: JavaScript Deobfuscator
    
    <!DOCTYPE html>
    <html lang="en">
      <head>
        <!-- Meta Data -->
        <title>JavaScript Deobfuscator</title>
        <meta charset="utf-8" />
        <meta
          name="description"
          content="A simple but powerful deobfuscator to remove common JavaScript
        obfuscation techniques"
        />
        <meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
        <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
        <link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
    
        <!-- Google tag (gtag.js) -->
        <script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
        <script>
          window.dataLayer = window.dataLayer || [];
          function gtag() {
            dataLayer.push(arguments);
          }
          gtag('js', new Date());
    
          gtag('config', 'G-PK6YQBK0W0');
        </script>
    
        <script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
        <script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
        <script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
        <script>
          window.ezstandalone = window.ezstandalone || {};
          ezstandalone.cmd = ezstandalone.cmd || [];
    
          ezstandalone.cmd.push(function () {
            ezstandalone.showAds(103, 104);
          });
        </script>
        <meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
    
        <!-- Links-->
        <link rel="stylesheet" href="./assets/css/main.css" />
        <link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
        <link rel="icon" href="/favicon.ico" />
      </head>
      <body>
        <!-- Error popup modal -->
        <div
          id="errorPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="errorPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="errorPopupModal"
                class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
              >
                <div>
                  <div class="text-center">
                    <h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
                      Error
                    </h3>
                    <div class="mt-2">
                      <p class="text-sm text-gray-500">
                        There was an error deobfuscating your code. Check the console for more details.
                      </p>
                    </div>
                  </div>
                </div>
                <div class="mt-5">
                  <button
                    id="errorPopupConfirmButton"
                    type="button"
                    class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
                  >
                    Ok
                  </button>
                </div>
              </div>
            </div>
          </div>
        </div>
    
        <!-- Obfuscator.io popup modal -->
        <div
          id="obfIoPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="obfIoPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="obfIoPopupModal"
                class="popupModal relative transform overflow-hid
    Found 2 days ago by HttpPlugin
    Create report
  • Open service 75.2.97.79:443 · deobfuscate.io

    2026-01-13 00:23

    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Access-Control-Allow-Credentials: true
    Access-Control-Allow-Origin: https://deobfuscate.io
    Cache-Control: public, max-age=0
    Content-Length: 20584
    Content-Type: text/html; charset=UTF-8
    Date: Tue, 13 Jan 2026 00:23:49 GMT
    Etag: W/"5068-19ba9b39bd8"
    Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
    Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
    Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263829"}],"max_age":3600}
    Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=WIGFPjHgOawXgkpKylJeYD0wVrpa6iobzmvaJVqlpCI%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263829"
    Server: Heroku
    Vary: Origin
    Via: 1.1 heroku-router
    X-Powered-By: Express
    Connection: close
    
    Page title: JavaScript Deobfuscator
    
    <!DOCTYPE html>
    <html lang="en">
      <head>
        <!-- Meta Data -->
        <title>JavaScript Deobfuscator</title>
        <meta charset="utf-8" />
        <meta
          name="description"
          content="A simple but powerful deobfuscator to remove common JavaScript
        obfuscation techniques"
        />
        <meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
        <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
        <link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
    
        <!-- Google tag (gtag.js) -->
        <script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
        <script>
          window.dataLayer = window.dataLayer || [];
          function gtag() {
            dataLayer.push(arguments);
          }
          gtag('js', new Date());
    
          gtag('config', 'G-PK6YQBK0W0');
        </script>
    
        <script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
        <script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
        <script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
        <script>
          window.ezstandalone = window.ezstandalone || {};
          ezstandalone.cmd = ezstandalone.cmd || [];
    
          ezstandalone.cmd.push(function () {
            ezstandalone.showAds(103, 104);
          });
        </script>
        <meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
    
        <!-- Links-->
        <link rel="stylesheet" href="./assets/css/main.css" />
        <link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
        <link rel="icon" href="/favicon.ico" />
      </head>
      <body>
        <!-- Error popup modal -->
        <div
          id="errorPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="errorPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="errorPopupModal"
                class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
              >
                <div>
                  <div class="text-center">
                    <h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
                      Error
                    </h3>
                    <div class="mt-2">
                      <p class="text-sm text-gray-500">
                        There was an error deobfuscating your code. Check the console for more details.
                      </p>
                    </div>
                  </div>
                </div>
                <div class="mt-5">
                  <button
                    id="errorPopupConfirmButton"
                    type="button"
                    class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
                  >
                    Ok
                  </button>
                </div>
              </div>
            </div>
          </div>
        </div>
    
        <!-- Obfuscator.io popup modal -->
        <div
          id="obfIoPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="obfIoPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="obfIoPopupModal"
                class="popupModal relative transform overflow-hid
    Found 2 days ago by HttpPlugin
    Create report
  • Open service 99.83.151.71:80 · deobfuscate.io

    2026-01-13 00:23

    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Access-Control-Allow-Credentials: true
    Access-Control-Allow-Origin: https://deobfuscate.io
    Cache-Control: public, max-age=0
    Content-Length: 20584
    Content-Type: text/html; charset=UTF-8
    Date: Tue, 13 Jan 2026 00:24:50 GMT
    Etag: W/"5068-19ba9b39bd8"
    Last-Modified: Sat, 10 Jan 2026 20:57:59 GMT
    Nel: {"report_to":"heroku-nel","response_headers":["Via"],"max_age":3600,"success_fraction":0.01,"failure_fraction":0.1}
    Report-To: {"group":"heroku-nel","endpoints":[{"url":"https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D\u0026sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add\u0026ts=1768263890"}],"max_age":3600}
    Reporting-Endpoints: heroku-nel="https://nel.heroku.com/reports?s=5ohdznsBGuC4tmLGvSamS%2B5jN8gJX2VHnC%2F9Fzz5exw%3D&sid=c46efe9b-d3d2-4a0c-8c76-bfafa16c5add&ts=1768263890"
    Server: Heroku
    Vary: Origin
    Via: 1.1 heroku-router
    X-Powered-By: Express
    Connection: close
    
    Page title: JavaScript Deobfuscator
    
    <!DOCTYPE html>
    <html lang="en">
      <head>
        <!-- Meta Data -->
        <title>JavaScript Deobfuscator</title>
        <meta charset="utf-8" />
        <meta
          name="description"
          content="A simple but powerful deobfuscator to remove common JavaScript
        obfuscation techniques"
        />
        <meta name="keywords" content="deobfuscate, deobfuscator, obfuscate, JavaScript" />
        <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" />
        <link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet" />
    
        <!-- Google tag (gtag.js) -->
        <script async src="https://www.googletagmanager.com/gtag/js?id=G-PK6YQBK0W0"></script>
        <script>
          window.dataLayer = window.dataLayer || [];
          function gtag() {
            dataLayer.push(arguments);
          }
          gtag('js', new Date());
    
          gtag('config', 'G-PK6YQBK0W0');
        </script>
    
        <script data-cfasync="false" src="https://cmp.gatekeeperconsent.com/min.js"></script>
        <script data-cfasync="false" src="https://the.gatekeeperconsent.com/cmp.min.js"></script>
        <script async src="//www.ezojs.com/ezoic/sa.min.js"></script>
        <script>
          window.ezstandalone = window.ezstandalone || {};
          ezstandalone.cmd = ezstandalone.cmd || [];
    
          ezstandalone.cmd.push(function () {
            ezstandalone.showAds(103, 104);
          });
        </script>
        <meta name="ezoic-site-verification" content="uUcs58fW9Go9xiY69JZLDqYnh9HtvR" />
    
        <!-- Links-->
        <link rel="stylesheet" href="./assets/css/main.css" />
        <link rel="stylesheet" href="./assets/codemirror/lib/codemirror.css" />
        <link rel="icon" href="/favicon.ico" />
      </head>
      <body>
        <!-- Error popup modal -->
        <div
          id="errorPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="errorPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="errorPopupModal"
                class="popupModal relative transform overflow-hidden rounded-lg bg-white px-4 pb-4 pt-5 text-left shadow-xl transition-all sm:my-8 sm:w-full sm:max-w-md sm:p-6"
              >
                <div>
                  <div class="text-center">
                    <h3 class="text-base font-semibold leading-6 text-gray-900" id="modal-title">
                      Error
                    </h3>
                    <div class="mt-2">
                      <p class="text-sm text-gray-500">
                        There was an error deobfuscating your code. Check the console for more details.
                      </p>
                    </div>
                  </div>
                </div>
                <div class="mt-5">
                  <button
                    id="errorPopupConfirmButton"
                    type="button"
                    class="inline-flex w-full justify-center rounded-md bg-red-600 px-3 py-2 text-sm font-semibold text-white shadow-sm hover:bg-red-500 focus-visible:outline focus-visible:outline-2 focus-visible:outline-offset-2 focus-visible:outline-red-600"
                  >
                    Ok
                  </button>
                </div>
              </div>
            </div>
          </div>
        </div>
    
        <!-- Obfuscator.io popup modal -->
        <div
          id="obfIoPopupContainer"
          class="popupContainer relative z-10"
          aria-labelledby="modal-title"
          role="dialog"
          aria-modal="true"
        >
          <div
            id="obfIoPopupBg"
            class="popupBg fixed inset-0 bg-gray-500 bg-opacity-75 transition-opacity"
          ></div>
    
          <div class="fixed inset-0 z-10 overflow-y-auto">
            <div class="flex min-h-full items-end justify-center p-4 text-center items-center p-0">
              <div
                id="obfIoPopupModal"
                class="popupModal relative transform overflow-hid
    Found 2 days ago by HttpPlugin
    Create report
  • Open service 2606:50c0:8000::153:443 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 701
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT
    Access-Control-Allow-Origin: *
    Strict-Transport-Security: max-age=31556952
    ETag: "6953eddf-2bd"
    expires: Thu, 01 Jan 2026 04:55:19 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 7C52:35C252:2EF2781:330881B:6955FBDF
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lga21927-LGA
    X-Cache: HIT
    X-Cache-Hits: 5
    X-Timer: S1767242719.304872,VS0,VE0
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 987226767488527105fd68ed8813dceedcba80b6
    
    Page title: Obfuscator.io Deobfuscator
    
    <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 2606:50c0:8002::153:443 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 701
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    x-origin-cache: HIT
    Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT
    Access-Control-Allow-Origin: *
    Strict-Transport-Security: max-age=31556952
    ETag: "6953eddf-2bd"
    expires: Thu, 01 Jan 2026 04:55:19 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 439A:1E3944:59E7FC2:5CB978F:6955FBDF
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-sjc10072-SJC
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.417937,VS0,VE2
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 2fff31cadea302215a19fb4fda9aa7d5914727c7
    
    Page title: Obfuscator.io Deobfuscator
    
    <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 2606:50c0:8003::153:443 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 701
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT
    Access-Control-Allow-Origin: *
    Strict-Transport-Security: max-age=31556952
    ETag: "6953eddf-2bd"
    expires: Thu, 01 Jan 2026 04:55:19 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 7C52:35C252:2EF2781:330881B:6955FBDF
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lga21947-LGA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.265777,VS0,VE2
    Vary: Accept-Encoding
    X-Fastly-Request-ID: d63ac95bc445cfb685ee201c66f74981107f126d
    
    Page title: Obfuscator.io Deobfuscator
    
    <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 185.199.111.153:443 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 701
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    x-origin-cache: HIT
    Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT
    Access-Control-Allow-Origin: *
    Strict-Transport-Security: max-age=31556952
    ETag: "6953eddf-2bd"
    expires: Thu, 01 Jan 2026 04:55:19 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 23FC:3BD049:4E15B4A:4F84E24:6955FBDE
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lcy-egml8630087-LCY
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.339336,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: f1f927adc4eb51a09ea0620d737fb1d8e0e5899c
    
    Page title: Obfuscator.io Deobfuscator
    
    <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 185.199.111.153:80 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://obf-io.deobfuscate.io/
    X-GitHub-Request-Id: 6889:35D5BF:A946B63:ABAB229:6955FBDF
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-fra-eddf8230183-FRA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.339896,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 38169d0a6d431edfec4f738534c66fff2052aec0
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 185.199.109.153:80 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://obf-io.deobfuscate.io/
    X-GitHub-Request-Id: 6EE6:F1323:5695429:595E33D:6955FBDF
    Accept-Ranges: bytes
    Age: 0
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    X-Served-By: cache-pao-kpao1770033-PAO
    X-Cache: MISS
    X-Cache-Hits: 0
    X-Timer: S1767242719.310748,VS0,VE104
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 9b3889d5e59fe2f55f736198c1a9b9dca40223d2
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 185.199.108.153:443 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 701
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT
    Access-Control-Allow-Origin: *
    Strict-Transport-Security: max-age=31556952
    ETag: "6953eddf-2bd"
    expires: Thu, 01 Jan 2026 04:55:19 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 9C5A:83D7F:AB47E82:ADA5B1E:6955FBDF
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-fra-eddf8230186-FRA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.252429,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 7cc494f32671fd6969e05e309f309dd65911f355
    
    Page title: Obfuscator.io Deobfuscator
    
    <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 185.199.109.153:443 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 701
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT
    Access-Control-Allow-Origin: *
    Strict-Transport-Security: max-age=31556952
    ETag: "6953eddf-2bd"
    expires: Thu, 01 Jan 2026 04:55:19 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 9C5A:83D7F:AB47E82:ADA5B1E:6955FBDF
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-fra-eddf8230137-FRA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.251730,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 655b44f8d8b6fd35bf5de0ca5be67a76a478ccfe
    
    Page title: Obfuscator.io Deobfuscator
    
    <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 2606:50c0:8002::153:80 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://obf-io.deobfuscate.io/
    X-GitHub-Request-Id: CD4A:28320D:3761ED0:3B7EFAB:6955FBDE
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-yyz4535-YYZ
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.163732,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 1dea096196f033ee180b03b2ae0cc47e758a3439
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 2606:50c0:8001::153:80 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://obf-io.deobfuscate.io/
    X-GitHub-Request-Id: 79DE:2368DD:ABE527A:AE4C124:6955FBDF
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-rtm-ehrd2290028-RTM
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.214388,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 3ea9ad89070b685553c428df8822f90c2dc4796e
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 2606:50c0:8000::153:80 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://obf-io.deobfuscate.io/
    X-GitHub-Request-Id: 79DE:2368DD:ABE527A:AE4C124:6955FBDF
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-rtm-ehrd2290054-RTM
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.213696,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: ac647543ca0b59726bf3652e74e3ceb1e5432c56
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 185.199.110.153:443 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 701
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT
    Access-Control-Allow-Origin: *
    Strict-Transport-Security: max-age=31556952
    ETag: "6953eddf-2bd"
    expires: Thu, 01 Jan 2026 04:55:19 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 9457:28320D:3761EC5:3B7EFA3:6955FBDE
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-yyz4547-YYZ
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.147408,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 34c2aec2b93e61dbfb517772e007f0cc88ace6de
    
    Page title: Obfuscator.io Deobfuscator
    
    <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 2606:50c0:8003::153:80 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://obf-io.deobfuscate.io/
    X-GitHub-Request-Id: FE26:2ED019:895DEA4:95937BB:6955FBDE
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lga21968-LGA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.104303,VS0,VE2
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 7af2482a2c304fbd80730ef913aaff04c395192b
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 2606:50c0:8001::153:443 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 701
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    Last-Modified: Tue, 30 Dec 2025 15:21:03 GMT
    Access-Control-Allow-Origin: *
    Strict-Transport-Security: max-age=31556952
    ETag: "6953eddf-2bd"
    expires: Thu, 01 Jan 2026 04:55:19 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 7C52:35C252:2EF2781:330881B:6955FBDF
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lga21987-LGA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.118967,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: a93b49523c0204c21c80bf4c7d0ddc2c3fdfb69b
    
    Page title: Obfuscator.io Deobfuscator
    
    <!doctype html><html lang="en"><head><meta charset="utf-8"/><meta name="viewport" content="width=device-width,initial-scale=1"/><meta name="theme-color" content="#000000"/><meta name="description" content="Obfuscator.io Deobfuscator"/><title>Obfuscator.io Deobfuscator</title><link rel="icon" href="/favicon.ico"/><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-4564190868901894" crossorigin="anonymous"></script><script defer="defer" src="/static/js/main.1c2e5386.js"></script><link href="/static/css/main.32db4389.css" rel="stylesheet"></head><body><noscript>You need to enable JavaScript to run this app.</noscript><div id="root"></div></body></html>
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 185.199.110.153:80 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://obf-io.deobfuscate.io/
    X-GitHub-Request-Id: FE26:2ED019:895DEA4:95937BB:6955FBDE
    Accept-Ranges: bytes
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lga21987-LGA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1767242719.108407,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: cb0a048c061a44509aa0eadf69a83bb4e9ece955
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 185.199.108.153:80 · obf-io.deobfuscate.io

    2026-01-01 04:45

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    x-origin-cache: HIT
    Location: https://obf-io.deobfuscate.io/
    X-GitHub-Request-Id: A23E:1E8009:4DE1EAD:4F512E3:6955FBDE
    Accept-Ranges: bytes
    Age: 0
    Date: Thu, 01 Jan 2026 04:45:19 GMT
    Via: 1.1 varnish
    X-Served-By: cache-lon4255-LON
    X-Cache: MISS
    X-Cache-Hits: 0
    X-Timer: S1767242719.111652,VS0,VE83
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 5ae08a615c397203c5f5ed203db0e475fde17146
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2026-01-01 by HttpPlugin
    Create report
  • Open service 76.76.21.93:443 · landing.deobfuscate.io

    2025-12-22 14:29

    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Access-Control-Allow-Origin: *
    Age: 3714145
    Cache-Control: public, max-age=0, must-revalidate
    Content-Disposition: inline
    Content-Length: 25775
    Content-Type: text/html; charset=utf-8
    Date: Mon, 22 Dec 2025 14:29:09 GMT
    Etag: "749f0124d9636f80f63aa84b4cc5aa3e"
    Last-Modified: Sun, 09 Nov 2025 14:46:43 GMT
    Server: Vercel
    Strict-Transport-Security: max-age=63072000
    X-Matched-Path: /
    X-Vercel-Cache: HIT
    X-Vercel-Id: iad1::b92gn-1766413749424-6e4cac8e3be5
    Connection: close
    
    Page title: Ocule
    
    <!DOCTYPE html><html><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><title>Ocule</title><meta name="next-head-count" content="3"/><link rel="preconnect" href="https://fonts.googleapis.com"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin=""/><link rel="icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-32x32.png" sizes="32x32"/><link rel="icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-192x192.png" sizes="192x192"/><link rel="apple-touch-icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-180x180.png"/><meta name="msapplication-TileImage" content="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-270x270.png"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin /><link rel="preload" href="/_next/static/css/fa11c86712184e0a.css" as="style"/><link rel="stylesheet" href="/_next/static/css/fa11c86712184e0a.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/_next/static/chunks/webpack-8fa1640cc84ba8fe.js" defer=""></script><script src="/_next/static/chunks/framework-2c79e2a64abdb08b.js" defer=""></script><script src="/_next/static/chunks/main-dfccacc1cfe3cbfe.js" defer=""></script><script src="/_next/static/chunks/pages/_app-b0cf226e842d891d.js" defer=""></script><script src="/_next/static/chunks/pages/index-93802a9fe876664f.js" defer=""></script><script src="/_next/static/2w-woMOULRXUFbTzhXknU/_buildManifest.js" defer=""></script><script src="/_next/static/2w-woMOULRXUFbTzhXknU/_ssgManifest.js" defer=""></script><style data-href="https://fonts.googleapis.com/css2?family=Roboto:wght@100;300;400;500;700;900&display=swap">@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgWxM.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:300;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmSU5vAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:400;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOmCnqEu92Fr1Me5g.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:500;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmEU9vAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:700;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmWUlvAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:900;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmYUtvAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxFIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0460-052F,U+1C80-1C88,U+20B4,U+2DE0-2DFF,U+A640-A69F,U+FE2E-FE2F}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxMIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0301,U+0400-045F,U+0490-0491,U+04B0-04B1,U+2116}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxEIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+1F00-1FFF}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxLIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0370-03FF}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 66.33.60.194:80 · landing.deobfuscate.io

    2025-12-22 14:29

    HTTP/1.0 308 Permanent Redirect
    Content-Type: text/plain
    Location: https://landing.deobfuscate.io/
    Refresh: 0;url=https://landing.deobfuscate.io/
    server: Vercel
    
    
    Redirecting...
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 76.76.21.93:80 · landing.deobfuscate.io

    2025-12-22 14:29

    HTTP/1.0 308 Permanent Redirect
    Content-Type: text/plain
    Location: https://landing.deobfuscate.io/
    Refresh: 0;url=https://landing.deobfuscate.io/
    server: Vercel
    
    
    Redirecting...
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 66.33.60.194:443 · landing.deobfuscate.io

    2025-12-22 14:29

    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Access-Control-Allow-Origin: *
    Age: 3714145
    Cache-Control: public, max-age=0, must-revalidate
    Content-Disposition: inline
    Content-Length: 25775
    Content-Type: text/html; charset=utf-8
    Date: Mon, 22 Dec 2025 14:29:09 GMT
    Etag: "749f0124d9636f80f63aa84b4cc5aa3e"
    Last-Modified: Sun, 09 Nov 2025 14:46:43 GMT
    Server: Vercel
    Strict-Transport-Security: max-age=63072000
    X-Matched-Path: /
    X-Vercel-Cache: HIT
    X-Vercel-Id: iad1::nrp89-1766413749377-2c34d3494467
    Connection: close
    
    Page title: Ocule
    
    <!DOCTYPE html><html><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><title>Ocule</title><meta name="next-head-count" content="3"/><link rel="preconnect" href="https://fonts.googleapis.com"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin=""/><link rel="icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-32x32.png" sizes="32x32"/><link rel="icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-192x192.png" sizes="192x192"/><link rel="apple-touch-icon" href="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-180x180.png"/><meta name="msapplication-TileImage" content="https://bucketeer-34f32e4c-8fe9-4051-bf0b-86722fea227e.s3.amazonaws.com/20220414145125/cropped-favicon-512-1-270x270.png"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin /><link rel="preload" href="/_next/static/css/fa11c86712184e0a.css" as="style"/><link rel="stylesheet" href="/_next/static/css/fa11c86712184e0a.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js"></script><script src="/_next/static/chunks/webpack-8fa1640cc84ba8fe.js" defer=""></script><script src="/_next/static/chunks/framework-2c79e2a64abdb08b.js" defer=""></script><script src="/_next/static/chunks/main-dfccacc1cfe3cbfe.js" defer=""></script><script src="/_next/static/chunks/pages/_app-b0cf226e842d891d.js" defer=""></script><script src="/_next/static/chunks/pages/index-93802a9fe876664f.js" defer=""></script><script src="/_next/static/2w-woMOULRXUFbTzhXknU/_buildManifest.js" defer=""></script><script src="/_next/static/2w-woMOULRXUFbTzhXknU/_ssgManifest.js" defer=""></script><style data-href="https://fonts.googleapis.com/css2?family=Roboto:wght@100;300;400;500;700;900&display=swap">@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgWxM.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:300;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmSU5vAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:400;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOmCnqEu92Fr1Me5g.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:500;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmEU9vAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:700;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmWUlvAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:900;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOlCnqEu92Fr1MmYUtvAA.woff) format('woff')}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxFIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0460-052F,U+1C80-1C88,U+20B4,U+2DE0-2DFF,U+A640-A69F,U+FE2E-FE2F}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxMIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0301,U+0400-045F,U+0490-0491,U+04B0-04B1,U+2116}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxEIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+1F00-1FFF}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/s/roboto/v30/KFOkCnqEu92Fr1MmgVxLIzIXKMnyrYk.woff2) format('woff2');unicode-range:U+0370-03FF}@font-face{font-family:'Roboto';font-style:normal;font-weight:100;font-display:swap;src:url(https://fonts.gstatic.com/
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 185.199.109.153:443 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 5023
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
    Access-Control-Allow-Origin: *
    ETag: "67b79d0f-139f"
    expires: Mon, 22 Dec 2025 06:59:54 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 36BE:1E1694:B8AF39:C9603B:6948EA12
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lga21977-LGA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.720266,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 6c8a7225e5f5c1b55e4a3d1c6a716be602f16522
    
    Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
    
    <!DOCTYPE html>
    <html>
    <head>
      <meta charset="UTF-8" />
      <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
      <meta name="generator" content="Jekyll" />
    
      <link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
    
      <title>Reverse Engineering Blog</title>
    
      <link rel="stylesheet" href="/css/main.css">
      
    
      <link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
      <!-- Begin Jekyll SEO tag v2.8.0 -->
    <title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
    <meta name="generator" content="Jekyll v3.10.0" />
    <meta property="og:title" content="Reverse Engineering Blog" />
    <meta name="author" content="ben-sb" />
    <meta property="og:locale" content="en_US" />
    <meta name="description" content="A blog covering reverse engineering and related topics." />
    <meta property="og:description" content="A blog covering reverse engineering and related topics." />
    <link rel="canonical" href="https://blog.deobfuscate.io/" />
    <meta property="og:url" content="https://blog.deobfuscate.io/" />
    <meta property="og:site_name" content="Reverse Engineering Blog" />
    <meta property="og:type" content="website" />
    <link rel="next" href="https://blog.deobfuscate.io/page/2/" />
    <meta name="twitter:card" content="summary" />
    <meta property="twitter:title" content="Reverse Engineering Blog" />
    <script type="application/ld+json">
    {"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
    <!-- End Jekyll SEO tag -->
    
    </head>
    
    
    <body>
      <div id="wrapper">
        <header>
      <div>
        <a href="/">
        
        <h1>ben-sb@home:~$</h1>
        </a>
        <div class="header-links">
          <a href="/posts"><h2 class="header-link">Posts</h2></a>
    <a href="/about"><h2 class="header-link">About</h2></a>
        </div>
      </div>
    </header>
        <div class="container">
          <section id="main_content">
            <ul>
        
          <li>
              <h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
              <time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
              <p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
          </li>
        
          <li>
              <h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
              <time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
              <p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
          </li>
        
          <li>
              <h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
              <time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
              <p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
          </li>
        
          <li>
              <h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
              <time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
              <p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 2606:50c0:8000::153:443 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 5023
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    x-origin-cache: HIT
    Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
    Access-Control-Allow-Origin: *
    ETag: "67b79d0f-139f"
    expires: Mon, 22 Dec 2025 06:59:54 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: B126:3F0015:B7B04C:C86565:6948EA12
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-yyz4553-YYZ
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.694820,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 8a39fd478449837a30bc4672592f2e90d122ada7
    
    Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
    
    <!DOCTYPE html>
    <html>
    <head>
      <meta charset="UTF-8" />
      <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
      <meta name="generator" content="Jekyll" />
    
      <link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
    
      <title>Reverse Engineering Blog</title>
    
      <link rel="stylesheet" href="/css/main.css">
      
    
      <link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
      <!-- Begin Jekyll SEO tag v2.8.0 -->
    <title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
    <meta name="generator" content="Jekyll v3.10.0" />
    <meta property="og:title" content="Reverse Engineering Blog" />
    <meta name="author" content="ben-sb" />
    <meta property="og:locale" content="en_US" />
    <meta name="description" content="A blog covering reverse engineering and related topics." />
    <meta property="og:description" content="A blog covering reverse engineering and related topics." />
    <link rel="canonical" href="https://blog.deobfuscate.io/" />
    <meta property="og:url" content="https://blog.deobfuscate.io/" />
    <meta property="og:site_name" content="Reverse Engineering Blog" />
    <meta property="og:type" content="website" />
    <link rel="next" href="https://blog.deobfuscate.io/page/2/" />
    <meta name="twitter:card" content="summary" />
    <meta property="twitter:title" content="Reverse Engineering Blog" />
    <script type="application/ld+json">
    {"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
    <!-- End Jekyll SEO tag -->
    
    </head>
    
    
    <body>
      <div id="wrapper">
        <header>
      <div>
        <a href="/">
        
        <h1>ben-sb@home:~$</h1>
        </a>
        <div class="header-links">
          <a href="/posts"><h2 class="header-link">Posts</h2></a>
    <a href="/about"><h2 class="header-link">About</h2></a>
        </div>
      </div>
    </header>
        <div class="container">
          <section id="main_content">
            <ul>
        
          <li>
              <h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
              <time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
              <p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
          </li>
        
          <li>
              <h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
              <time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
              <p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
          </li>
        
          <li>
              <h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
              <time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
              <p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
          </li>
        
          <li>
              <h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
              <time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
              <p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 2606:50c0:8001::153:443 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 5023
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
    Access-Control-Allow-Origin: *
    ETag: "67b79d0f-139f"
    expires: Mon, 22 Dec 2025 06:59:54 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 29CF:1711E2:11CE9B7:122C4F5:6948EA12
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lcy-egml8630081-LCY
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.744582,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: e4a68f314ac8d09eb40f9de35b599395f6a40405
    
    Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
    
    <!DOCTYPE html>
    <html>
    <head>
      <meta charset="UTF-8" />
      <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
      <meta name="generator" content="Jekyll" />
    
      <link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
    
      <title>Reverse Engineering Blog</title>
    
      <link rel="stylesheet" href="/css/main.css">
      
    
      <link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
      <!-- Begin Jekyll SEO tag v2.8.0 -->
    <title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
    <meta name="generator" content="Jekyll v3.10.0" />
    <meta property="og:title" content="Reverse Engineering Blog" />
    <meta name="author" content="ben-sb" />
    <meta property="og:locale" content="en_US" />
    <meta name="description" content="A blog covering reverse engineering and related topics." />
    <meta property="og:description" content="A blog covering reverse engineering and related topics." />
    <link rel="canonical" href="https://blog.deobfuscate.io/" />
    <meta property="og:url" content="https://blog.deobfuscate.io/" />
    <meta property="og:site_name" content="Reverse Engineering Blog" />
    <meta property="og:type" content="website" />
    <link rel="next" href="https://blog.deobfuscate.io/page/2/" />
    <meta name="twitter:card" content="summary" />
    <meta property="twitter:title" content="Reverse Engineering Blog" />
    <script type="application/ld+json">
    {"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
    <!-- End Jekyll SEO tag -->
    
    </head>
    
    
    <body>
      <div id="wrapper">
        <header>
      <div>
        <a href="/">
        
        <h1>ben-sb@home:~$</h1>
        </a>
        <div class="header-links">
          <a href="/posts"><h2 class="header-link">Posts</h2></a>
    <a href="/about"><h2 class="header-link">About</h2></a>
        </div>
      </div>
    </header>
        <div class="container">
          <section id="main_content">
            <ul>
        
          <li>
              <h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
              <time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
              <p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
          </li>
        
          <li>
              <h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
              <time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
              <p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
          </li>
        
          <li>
              <h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
              <time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
              <p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
          </li>
        
          <li>
              <h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
              <time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
              <p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 2606:50c0:8002::153:80 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://blog.deobfuscate.io/
    X-GitHub-Request-Id: 0FC3:2FF8EC:2E3F6E5:2EE7538:6948EA0A
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-fra-eddf8230094-FRA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.701306,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 6418ee2ce3663efeac2d903f3d7e0c27ca6787af
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 185.199.110.153:443 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 5023
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    x-origin-cache: HIT
    Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
    Access-Control-Allow-Origin: *
    ETag: "67b79d0f-139f"
    expires: Mon, 22 Dec 2025 06:59:54 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 0CEC:2FF8EC:2E3F6EA:2EE753D:6948EA12
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-fra-eddf8230134-FRA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.722945,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 4648ed40f029ecdab7a16368f7478e43ef05fd26
    
    Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
    
    <!DOCTYPE html>
    <html>
    <head>
      <meta charset="UTF-8" />
      <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
      <meta name="generator" content="Jekyll" />
    
      <link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
    
      <title>Reverse Engineering Blog</title>
    
      <link rel="stylesheet" href="/css/main.css">
      
    
      <link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
      <!-- Begin Jekyll SEO tag v2.8.0 -->
    <title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
    <meta name="generator" content="Jekyll v3.10.0" />
    <meta property="og:title" content="Reverse Engineering Blog" />
    <meta name="author" content="ben-sb" />
    <meta property="og:locale" content="en_US" />
    <meta name="description" content="A blog covering reverse engineering and related topics." />
    <meta property="og:description" content="A blog covering reverse engineering and related topics." />
    <link rel="canonical" href="https://blog.deobfuscate.io/" />
    <meta property="og:url" content="https://blog.deobfuscate.io/" />
    <meta property="og:site_name" content="Reverse Engineering Blog" />
    <meta property="og:type" content="website" />
    <link rel="next" href="https://blog.deobfuscate.io/page/2/" />
    <meta name="twitter:card" content="summary" />
    <meta property="twitter:title" content="Reverse Engineering Blog" />
    <script type="application/ld+json">
    {"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
    <!-- End Jekyll SEO tag -->
    
    </head>
    
    
    <body>
      <div id="wrapper">
        <header>
      <div>
        <a href="/">
        
        <h1>ben-sb@home:~$</h1>
        </a>
        <div class="header-links">
          <a href="/posts"><h2 class="header-link">Posts</h2></a>
    <a href="/about"><h2 class="header-link">About</h2></a>
        </div>
      </div>
    </header>
        <div class="container">
          <section id="main_content">
            <ul>
        
          <li>
              <h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
              <time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
              <p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
          </li>
        
          <li>
              <h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
              <time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
              <p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
          </li>
        
          <li>
              <h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
              <time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
              <p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
          </li>
        
          <li>
              <h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
              <time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
              <p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 185.199.109.153:80 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://blog.deobfuscate.io/
    X-GitHub-Request-Id: 9BA2:31C5C1:B81A44:C8C280:6948EA11
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lga21938-LGA
    X-Cache: HIT
    X-Cache-Hits: 2
    X-Timer: S1766386195.659563,VS0,VE0
    Vary: Accept-Encoding
    X-Fastly-Request-ID: c8e09b1a4e0d5fb536d6cddfeceb2157ac732dad
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 185.199.108.153:443 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 5023
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
    Access-Control-Allow-Origin: *
    ETag: "67b79d0f-139f"
    expires: Mon, 22 Dec 2025 06:59:54 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 9B3C:1711E2:11CE9BC:122C4FD:6948EA12
    Accept-Ranges: bytes
    Age: 0
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    X-Served-By: cache-lon4242-LON
    X-Cache: MISS
    X-Cache-Hits: 0
    X-Timer: S1766386195.743678,VS0,VE98
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 7b5319cb93ca8ebccac0db4c3409b650a641fff2
    
    Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
    
    <!DOCTYPE html>
    <html>
    <head>
      <meta charset="UTF-8" />
      <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
      <meta name="generator" content="Jekyll" />
    
      <link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
    
      <title>Reverse Engineering Blog</title>
    
      <link rel="stylesheet" href="/css/main.css">
      
    
      <link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
      <!-- Begin Jekyll SEO tag v2.8.0 -->
    <title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
    <meta name="generator" content="Jekyll v3.10.0" />
    <meta property="og:title" content="Reverse Engineering Blog" />
    <meta name="author" content="ben-sb" />
    <meta property="og:locale" content="en_US" />
    <meta name="description" content="A blog covering reverse engineering and related topics." />
    <meta property="og:description" content="A blog covering reverse engineering and related topics." />
    <link rel="canonical" href="https://blog.deobfuscate.io/" />
    <meta property="og:url" content="https://blog.deobfuscate.io/" />
    <meta property="og:site_name" content="Reverse Engineering Blog" />
    <meta property="og:type" content="website" />
    <link rel="next" href="https://blog.deobfuscate.io/page/2/" />
    <meta name="twitter:card" content="summary" />
    <meta property="twitter:title" content="Reverse Engineering Blog" />
    <script type="application/ld+json">
    {"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
    <!-- End Jekyll SEO tag -->
    
    </head>
    
    
    <body>
      <div id="wrapper">
        <header>
      <div>
        <a href="/">
        
        <h1>ben-sb@home:~$</h1>
        </a>
        <div class="header-links">
          <a href="/posts"><h2 class="header-link">Posts</h2></a>
    <a href="/about"><h2 class="header-link">About</h2></a>
        </div>
      </div>
    </header>
        <div class="container">
          <section id="main_content">
            <ul>
        
          <li>
              <h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
              <time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
              <p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
          </li>
        
          <li>
              <h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
              <time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
              <p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
          </li>
        
          <li>
              <h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
              <time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
              <p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
          </li>
        
          <li>
              <h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
              <time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
              <p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 2606:50c0:8002::153:443 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 5023
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
    Access-Control-Allow-Origin: *
    ETag: "67b79d0f-139f"
    expires: Mon, 22 Dec 2025 06:59:54 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 36BE:1E1694:B8AF39:C9603B:6948EA12
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lga21949-LGA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.681543,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: d43bb64a28df084388e76e7e79ff88c5f895dba8
    
    Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
    
    <!DOCTYPE html>
    <html>
    <head>
      <meta charset="UTF-8" />
      <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
      <meta name="generator" content="Jekyll" />
    
      <link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
    
      <title>Reverse Engineering Blog</title>
    
      <link rel="stylesheet" href="/css/main.css">
      
    
      <link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
      <!-- Begin Jekyll SEO tag v2.8.0 -->
    <title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
    <meta name="generator" content="Jekyll v3.10.0" />
    <meta property="og:title" content="Reverse Engineering Blog" />
    <meta name="author" content="ben-sb" />
    <meta property="og:locale" content="en_US" />
    <meta name="description" content="A blog covering reverse engineering and related topics." />
    <meta property="og:description" content="A blog covering reverse engineering and related topics." />
    <link rel="canonical" href="https://blog.deobfuscate.io/" />
    <meta property="og:url" content="https://blog.deobfuscate.io/" />
    <meta property="og:site_name" content="Reverse Engineering Blog" />
    <meta property="og:type" content="website" />
    <link rel="next" href="https://blog.deobfuscate.io/page/2/" />
    <meta name="twitter:card" content="summary" />
    <meta property="twitter:title" content="Reverse Engineering Blog" />
    <script type="application/ld+json">
    {"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
    <!-- End Jekyll SEO tag -->
    
    </head>
    
    
    <body>
      <div id="wrapper">
        <header>
      <div>
        <a href="/">
        
        <h1>ben-sb@home:~$</h1>
        </a>
        <div class="header-links">
          <a href="/posts"><h2 class="header-link">Posts</h2></a>
    <a href="/about"><h2 class="header-link">About</h2></a>
        </div>
      </div>
    </header>
        <div class="container">
          <section id="main_content">
            <ul>
        
          <li>
              <h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
              <time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
              <p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
          </li>
        
          <li>
              <h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
              <time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
              <p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
          </li>
        
          <li>
              <h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
              <time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
              <p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
          </li>
        
          <li>
              <h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
              <time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
              <p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 2606:50c0:8003::153:80 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://blog.deobfuscate.io/
    X-GitHub-Request-Id: 9BA2:31C5C1:B81A44:C8C280:6948EA11
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lga21946-LGA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.639540,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: a49be76884d6ee7966dbcfded0ef1135df41bfb5
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 185.199.108.153:80 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://blog.deobfuscate.io/
    X-GitHub-Request-Id: 3CA2:1C5F94:11CC71F:122A2C5:6948EA09
    Accept-Ranges: bytes
    Age: 0
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    X-Served-By: cache-lon420146-LON
    X-Cache: MISS
    X-Cache-Hits: 0
    X-Timer: S1766386195.714316,VS0,VE90
    Vary: Accept-Encoding
    X-Fastly-Request-ID: a23a27434569b0104b54effa7299cf947cc6382d
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 185.199.111.153:443 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 5023
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    x-origin-cache: HIT
    Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
    Access-Control-Allow-Origin: *
    ETag: "67b79d0f-139f"
    expires: Mon, 22 Dec 2025 06:59:54 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: 0CEC:2FF8EC:2E3F6EA:2EE753D:6948EA12
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-fra-eddf8230118-FRA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.725551,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: d513ba9bfd0fed02f0f3e16d2417516bf8f21a21
    
    Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
    
    <!DOCTYPE html>
    <html>
    <head>
      <meta charset="UTF-8" />
      <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
      <meta name="generator" content="Jekyll" />
    
      <link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
    
      <title>Reverse Engineering Blog</title>
    
      <link rel="stylesheet" href="/css/main.css">
      
    
      <link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
      <!-- Begin Jekyll SEO tag v2.8.0 -->
    <title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
    <meta name="generator" content="Jekyll v3.10.0" />
    <meta property="og:title" content="Reverse Engineering Blog" />
    <meta name="author" content="ben-sb" />
    <meta property="og:locale" content="en_US" />
    <meta name="description" content="A blog covering reverse engineering and related topics." />
    <meta property="og:description" content="A blog covering reverse engineering and related topics." />
    <link rel="canonical" href="https://blog.deobfuscate.io/" />
    <meta property="og:url" content="https://blog.deobfuscate.io/" />
    <meta property="og:site_name" content="Reverse Engineering Blog" />
    <meta property="og:type" content="website" />
    <link rel="next" href="https://blog.deobfuscate.io/page/2/" />
    <meta name="twitter:card" content="summary" />
    <meta property="twitter:title" content="Reverse Engineering Blog" />
    <script type="application/ld+json">
    {"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
    <!-- End Jekyll SEO tag -->
    
    </head>
    
    
    <body>
      <div id="wrapper">
        <header>
      <div>
        <a href="/">
        
        <h1>ben-sb@home:~$</h1>
        </a>
        <div class="header-links">
          <a href="/posts"><h2 class="header-link">Posts</h2></a>
    <a href="/about"><h2 class="header-link">About</h2></a>
        </div>
      </div>
    </header>
        <div class="container">
          <section id="main_content">
            <ul>
        
          <li>
              <h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
              <time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
              <p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
          </li>
        
          <li>
              <h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
              <time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
              <p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
          </li>
        
          <li>
              <h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
              <time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
              <p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
          </li>
        
          <li>
              <h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
              <time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
              <p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 185.199.111.153:80 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    x-origin-cache: HIT
    Location: https://blog.deobfuscate.io/
    X-GitHub-Request-Id: DA8F:101C97:2D80BFC:2E2A9E5:6948EA11
    Accept-Ranges: bytes
    Age: 0
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    X-Served-By: cache-vie6323-VIE
    X-Cache: MISS
    X-Cache-Hits: 0
    X-Timer: S1766386195.723173,VS0,VE98
    Vary: Accept-Encoding
    X-Fastly-Request-ID: ba6ded0a16cf0cc9cbe6fec084851dd005d89897
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 2606:50c0:8003::153:443 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 200 OK
    Connection: close
    Content-Length: 5023
    Server: GitHub.com
    Content-Type: text/html; charset=utf-8
    x-origin-cache: HIT
    Last-Modified: Thu, 20 Feb 2025 21:22:23 GMT
    Access-Control-Allow-Origin: *
    ETag: "67b79d0f-139f"
    expires: Mon, 22 Dec 2025 06:59:54 GMT
    Cache-Control: max-age=600
    x-proxy-cache: MISS
    X-GitHub-Request-Id: B126:3F0015:B7B04C:C86565:6948EA12
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-yyz4560-YYZ
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.615177,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 3b30ffe2e12d60ae6a5746a17220a6fb640677d0
    
    Page title: Reverse Engineering BlogReverse Engineering Blog | A blog covering reverse engineering and related topics.
    
    <!DOCTYPE html>
    <html>
    <head>
      <meta charset="UTF-8" />
      <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1" />
      <meta name="generator" content="Jekyll" />
    
      <link rel="icon" type="image/x-icon" href="./assets/favicon.ico" />
    
      <title>Reverse Engineering Blog</title>
    
      <link rel="stylesheet" href="/css/main.css">
      
    
      <link href="/atom.xml" type="application/atom+xml" rel="alternate" title="ATOM Feed" />
      <!-- Begin Jekyll SEO tag v2.8.0 -->
    <title>Reverse Engineering Blog | A blog covering reverse engineering and related topics.</title>
    <meta name="generator" content="Jekyll v3.10.0" />
    <meta property="og:title" content="Reverse Engineering Blog" />
    <meta name="author" content="ben-sb" />
    <meta property="og:locale" content="en_US" />
    <meta name="description" content="A blog covering reverse engineering and related topics." />
    <meta property="og:description" content="A blog covering reverse engineering and related topics." />
    <link rel="canonical" href="https://blog.deobfuscate.io/" />
    <meta property="og:url" content="https://blog.deobfuscate.io/" />
    <meta property="og:site_name" content="Reverse Engineering Blog" />
    <meta property="og:type" content="website" />
    <link rel="next" href="https://blog.deobfuscate.io/page/2/" />
    <meta name="twitter:card" content="summary" />
    <meta property="twitter:title" content="Reverse Engineering Blog" />
    <script type="application/ld+json">
    {"@context":"https://schema.org","@type":"WebSite","author":{"@type":"Person","name":"ben-sb","url":"https://deobfuscate.io"},"description":"A blog covering reverse engineering and related topics.","headline":"Reverse Engineering Blog","name":"Reverse Engineering Blog","url":"https://blog.deobfuscate.io/"}</script>
    <!-- End Jekyll SEO tag -->
    
    </head>
    
    
    <body>
      <div id="wrapper">
        <header>
      <div>
        <a href="/">
        
        <h1>ben-sb@home:~$</h1>
        </a>
        <div class="header-links">
          <a href="/posts"><h2 class="header-link">Posts</h2></a>
    <a href="/about"><h2 class="header-link">About</h2></a>
        </div>
      </div>
    </header>
        <div class="container">
          <section id="main_content">
            <ul>
        
          <li>
              <h2><a href="/investigating-html-obfuscator">Investigating a HTML Obfuscator</a></h2>
              <time datetime="2025-02-20T00:00:00+00:00">20 Feb 2025</time>
              <p>I received an email recently suggesting I take a look at a HTML obfuscator. The tool is called Online HTML Obfuscator by PhpKobo, and claims to “heavily obfuscate HTML code”. I was a little skeptical of this claim, and decided to investigate to see how it was protecting the HTML....</p>
          </li>
        
          <li>
              <h2><a href="/reversing-vmcrack">Reversing VMCrack</a></h2>
              <time datetime="2024-09-01T00:00:00+00:00">01 Sep 2024</time>
              <p>Today we will be taking a look at one of, if not the hardest, reversing challenges from Hack The Box. The challenge is called vmcrack and is well known among the HTB community for being difficult. This is backed up by the difficulty ratings for the challenge: the majority of...</p>
          </li>
        
          <li>
              <h2><a href="/using-symbolic-execution-for-devirtualisation">Using Symbolic Execution to Devirtualise a Virtualised Binary</a></h2>
              <time datetime="2024-07-22T00:00:00+00:00">22 Jul 2024</time>
              <p>Today I will be discussing a sample binary which features virtual machine obfuscation, an obfuscation technique where the source code is compiled to a custom bytecode language and executed by an interpreter for this language. I will not be covering the basics of how VM obfuscation works; if you would...</p>
          </li>
        
          <li>
              <h2><a href="/deal-or-no-deal">Deal or No Deal: Graphing a Binary Rev Challenge</a></h2>
              <time datetime="2024-05-19T00:00:00+00:00">19 May 2024</time>
              <p>This post will describe solving a challenge from BYU Capture the Flag 2024. The challenge was called Deal or No Deal and was in the rev category. A compiled Rust binary is provided. Binary Ninja wasn’t grea
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 2606:50c0:8001::153:80 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://blog.deobfuscate.io/
    X-GitHub-Request-Id: E438:255727:BBC66D:CC6807:6948EA12
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-yyz4529-YYZ
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.551140,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: bdfd88edbeea7b750361514f0ac7d9c3e5a57c5b
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 185.199.110.153:80 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://blog.deobfuscate.io/
    X-GitHub-Request-Id: 9BA2:31C5C1:B81A44:C8C280:6948EA11
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-lga21925-LGA
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.555080,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: 7c24e4db800d1dc8df0f7183c7d2ac541b8d1b60
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2025-12-22 by HttpPlugin
    Create report
  • Open service 2606:50c0:8000::153:80 · blog.deobfuscate.io

    2025-12-22 06:49

    HTTP/1.1 301 Moved Permanently
    Connection: close
    Content-Length: 162
    Server: GitHub.com
    Content-Type: text/html
    Location: https://blog.deobfuscate.io/
    X-GitHub-Request-Id: E438:255727:BBC66D:CC6807:6948EA12
    Accept-Ranges: bytes
    Date: Mon, 22 Dec 2025 06:49:54 GMT
    Via: 1.1 varnish
    Age: 0
    X-Served-By: cache-yyz4545-YYZ
    X-Cache: HIT
    X-Cache-Hits: 1
    X-Timer: S1766386195.542180,VS0,VE1
    Vary: Accept-Encoding
    X-Fastly-Request-ID: acb6e709dfe80d20150baf49978a4c6dcf18251d
    
    Page title: 301 Moved Permanently
    
    <html>
    <head><title>301 Moved Permanently</title></head>
    <body>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    
    Found 2025-12-22 by HttpPlugin
    Create report
deobfuscate.io
CN:
deobfuscate.io
Key:
RSA-2048
Issuer:
R12
Not before:
2026-01-12 23:25
Not after:
2026-04-12 23:25
obf-io.deobfuscate.io
CN:
obf-io.deobfuscate.io
Key:
RSA-2048
Issuer:
R12
Not before:
2026-01-01 03:45
Not after:
2026-04-01 03:45
landing.deobfuscate.io
CN:
landing.deobfuscate.io
Key:
RSA-2048
Issuer:
R12
Not before:
2025-10-22 06:47
Not after:
2026-01-20 06:47
blog.deobfuscate.io
CN:
blog.deobfuscate.io
Key:
RSA-2048
Issuer:
R12
Not before:
2025-12-22 05:50
Not after:
2026-03-22 05:50