Screen Too Small

Minimum width of 320px is required to comfortably interact with the workspace. Please rotate your device.

Workspace

Drag & Drop Files

or click to browse from your computer

Global Settings

Secure Client-Side JavaScript Obfuscator

Developed by Ly Qui Chung and the 56KGen engineering team, JSArmor is a practical, in-browser GUI utility that orchestrates industry-standard open-source tools. Whether you need to js obfuscate a sensitive module or simply js uglify your build, this application executes entirely within your local environment to ensure your source code remains strictly confidential.

The Reality of Code Protection

Let’s be straightforward: Because JavaScript must be interpreted by the client's browser, absolute security against a determined, well-resourced reverse engineer is mathematically impossible. The true objective of a javascript obfuscator is deterrence. By transforming readable logic into flattened control flows and encoded string arrays, we increase the time, cost, and cognitive load required to decipher the algorithms.

The Processing Pipeline

JSArmor does not reinvent the wheel. It acts as an integration layer for a robust, multi-step pipeline:

  • 1. Minification: Utilizing AST parsing to strip dead code and compress the footprint. This handles the standard javascript uglify phase to optimize bundle size before obfuscation.
  • 2. Structural Obfuscation: Applies control flow flattening and string encoding. When you need to securely javascript obfucate your logic, this layer does the heavy lifting. Note: Aggressive configurations (like the High preset) will introduce runtime overhead and increase the final bundle size.
  • 3. Zero-Width Mangling: An experimental feature that re-parses the AST to rename variables using legal Zero-Width Non-Joiner (ZWNJ) and Joiner (ZWJ) characters.
    Engineering Note: While 100% ECMAScript compliant, this technique can trigger static analyzers, confuse linters, and break source maps. Use with caution in CI/CD environments.

Open-Source Acknowledgements

This tool is built upon the incredible work of the open-source community. We utilize the following libraries under the hood:

Author: Ly Qui Chung (56KGen)
JS Armor Official: jsarmor.56kgen.com
Website: 56kgen.com
Contact: webmaster@56kgen.com