AboutPartnersSupportTalk to us8.3
8.18.28.3
LOGIN
jscrambler logoUse Cases
Protect Your CodeGet Visibility Into Third-Party ScriptsProtect Sensitive DataControl Script BehaviourComply with PCI DSS
Products
Platform OverviewCode IntegrityWebpage Integrity
Industries
E-CommerceBankingMediaITGamingHealthcare
PlansResources
BlogLearning HubWebinarsCase StudiesGetting StartedProducts & Data SheetsWhite PapersReports & E-Books
Start a free trial
jscrambler logo
jscrambler logo
Use Cases
Products
Industries
Plans
Resources
Talk To Us
Login
Request a Demo
Solutions
By Need
JavaScript Protection
Magecart Mitigation
Mobile App Protection
Data Leakage Prevention
Third Party Control
Customer Hijacking Prevention
User Data Protection & Compliance
By Sector
Financial Services
IT & Software
E-Commerce
Healthcare
Media & OTT
Gaming & Gambling
Products
Code Integrity
Application Shielding
Runtime Protection
JavaScript Threat Monitoring
Webpage Integrity
Webpage Inventory
Third Party Management
User Data Management
Webpage Threat Mitigation
Resources
Partners
Docs
Blog
Learning Hub
Code Integrity
Help Center > Code Integrity > Documentation > Transformations

Transformations

Rasp

Targetless
Anti Monkey PatchingAnti-TamperingDead ObjectsSelf DefendingSelf Healing
Objects
Memory Protection

Optimization

Targetless
Assertions RemovalConstant FoldingDead Code EliminationDebug Code EliminationDuplicate Literals Removal
Identifiers
Identifiers Renaming
Minification
Whitespace Removal

Obfuscation

Booleans
Boolean To Anything
Strings
Char To Ternary OperatorString ConcealingString EncodingString Splitting
Statements
Comma Operator UnfoldingFunction OutliningVM-Based Obfuscation
Control Flow
Control-Flow FlatteningDead Code Injection
Statement
Countermeasure Injection
Identifiers
Dot to Bracket NotationGlobal Variable IndirectionIdentifiers Renaming
Targetless
Duplicate Literals Removal
Predicates
Extend Predicates
Functions
Function Reordering
Numbers
Number To String
Objects
Object Properties SparsingProperty Keys ObfuscationProperty Keys Reordering
Regular Expressions
Regex Obfuscation
Variables
Variable GroupingVariable Masking

Code Lock

Targetless
Browser LockDate LockDomain LockOS LockRoot/Jailbreak Detection Lock