JavaScript Deobfuscator
Unpack, format, and decode unreadable JavaScript to understand its underlying logic.
Deobfuscation Settings
Note: While this tool formats code and unescapes strings, variable names replaced by advanced obfuscators (like 'a', 'b', '_0x2a3') cannot be magically restored to their original English names.
How to Deobfuscate JavaScript
Paste the Code
Paste your packed, minified, or obfuscated JavaScript directly into the input area.
Select Unpack Settings
Ensure "Unescape Strings" is checked if the code looks like a giant wall of hex codes (e.g., \x48\x65).
Format & Read
Click "Deobfuscate & Format". The tool will instantly unpack the syntax and structure it cleanly for reading.
Deobfuscator Features
Intelligent Beautification
Automatically detects block structures, loops, and conditions to add proper line breaks, spacing, and multi-level indentation to dense scripts.
String Unescaping
Obfuscators often turn text into unreadable arrays (like \x63\x6F\x6E\x73). Our tool decodes these hex and Unicode sequences back to plain text.
100% Secure & Local
Your code is parsed and formatted using native browser capabilities and client-side JavaScript. The data never leaves your computer.
Frequently Asked Questions
A JavaScript Deobfuscator (or Unpacker) attempts to reverse the effects of minification and obfuscation. It applies standard code formatting (indentation, line breaks), unpacks common code wrappers (like Dean Edwards' Packer), and decodes encrypted strings (Hex/Unicode) to make the logic human-readable again.
No. When JavaScript is minified or heavily obfuscated, original variable and function names (like calculateTotal) are permanently replaced by meaningless letters (like a, b, or _0x12a). This data is completely destroyed during obfuscation. While this tool restores the structure of the code, you will still need to manually deduce what the single-letter variables do.
Obfuscators often hide plain text by converting it into hexadecimal or Unicode sequences. For example, the word "Hello" becomes \x48\x65\x6c\x6c\x6f. When the "Unescape Strings" option is enabled, our tool automatically finds these sequences and translates them back into standard text.
Yes, security researchers often use formatting tools like this to analyze obfuscated malicious payloads. Because this tool only parses and formats the text—and does not actually execute the unknown code in your environment—it is safe to use for analyzing potentially dangerous scripts.
Minification simply removes spaces, newlines, and shortens variable names to make the file size smaller for faster website loading. It is easy to reverse (beautify). Obfuscation intentionally scrambles the logic, injects dead code, and encrypts strings to prevent humans from understanding the code. Deobfuscation is significantly more difficult.
Absolutely not. This tool operates 100% on the client-side within your browser. The JavaScript you paste into the input box is never uploaded, tracked, or stored by our servers.