. Net obfuscation and decompilation tools

Source: Internet
Author: User
Tags dotnet failover
List of commonly used tools [more common]

Obfuscators, encryption

Dotfuscator

Vs default tool, butCommunityVersion

Low Intensity

DOTNET Reactor

Nativecode and obfuscation are used

Xenocode postbuild

Professional tools

{Smartassembly}. setup. MSI

Decompilation Tool

Reflector

One of the most prestigious tools, many open-source plug-ins

Xenocode Fox

Professional tools, commercial version

Ildasm

Vs Tool

Component merging and virtual tools: tools that facilitate software release, such as merging multiple DLL files

Xenocode Studio

All components and the. NET Framework involved can be stored in an execution file, which simplifies deployment and installation.

Dotfuscator

Component Merging

[During processing, pay attention to whether to select a database file or an execution file. The two methods are not the same. Before release, use the above decompilation to verify whether the processing is correct. This can be a protection function.]

Tool can find the name

Dotnetreactor.rar

Xenocode=postbuild=2010+for#.net.rar: available

Xenocode_virtual_application_studio_isv_edition.msi

Xenocodefox2007_v5.2_build_6675.rar: Fox is available, and others need to be connected.

{Smartassembly}. setup. MSI

Dotfuscatorpe42_rt20.zip

Network Information

Http://www.cnblogs.com/jason_z/archive/2009/10/19/1585804.html

Share: Several code obfuscators (dotfuscator,. Net reactor, xenocode)

Before introducing the tool, I need to describe the following points:

1. If the software you wrote does not involve commercial purposes, I do not recommend it in the light of the open source idea.CodeObfuscators

2. There are some risks when using the code obfuscator. It is best to back up the relevant code before use.

3. obfuscators cannot be used for any code that needs to be serialized into binary. The obfuscated code cannot be serialized normally! [After obfuscation of the domain name of the class, it is different after serialization]

Dotfuscator is a built-in code obfuscator in vs. Vs -- tool -- dotfuscator community Edition

Specific Use method, and the confusion effect, can refer to: http://blog.csdn.net/netjxz/archive/2006/12/12/1439866.aspx

. Net reactor, which is very small and free of installation and does not need to be registered. He only changes the code to a random code, but the obfuscated code can be used normally.

The specific use method is relatively simple,: http://files.cnblogs.com/ghost79/DotNETReactor.rar

Xeoncode is a relatively more professional code obfuscation software.ProgramIt can shield some decompilation tools (such as ildasm). The specific usage is as follows:

Usage 1:
1. Import the DOTNET program or assembly file (. dll/. EXE) to be encrypted)
2. Select "Protect" on the second tab"
3. Click "select pattern"
4. Select All "object types" and all "visiblility"
5. Select "Do not obfuscate" for "action" and apply, and set all content to not be confused.
6. Select "obfuscate" for "action", select "private" for "visibility", and apply
7. Press "xenocode assemblies" in the lower right corner to export the obfuscated File
Usage 2:
1. Select the application tag
2. Click the Add button to load the DLL and exe files to be confused.
3. If it is a DLL file, select the second item in the preset list box. Otherwise, select the first item.
4. Click Apply.
5. Select the protect tag
6. Select the supress other reflection tools check box.
7. Click Select string to set
8. Click the xenocode button to complete obfuscation.
9. replace another file until all the files are obfuscated!

The above is taken from the network and is for reference only.

2009 latest version, the registered license is also in the compressed package

: Http://d.download.csdn.net/down/1702658/Danny_Su

Http://seednet.to/html2/v5199.htm

Xenocode R virtual application studio allows you to customize and configure your

Desktop application, which can be deployed anywhere immediately.

New Features of virtual application studio:

Applications that deploy a zookeeper in a single, customizable line interface can be configured first in a single line.

Deploy the application programs and zookeeper in zookeeper that can be run anywhere immediately. Eliminate Security

Perform step-by-step failover, configure with slave, DLL hell, or disable failover. The xenocode runtime application does not need to be replaced

Manage or set operation. If you do not have a basic configuration change, you can place your website applications on the standard network.

Or the website, so that it can be used immediately by the user. Active Directory, streaming server, or other

. When concurrent. NET and Java applications do not need to run, the server guard can distribute distributed operations through a few clicks.

The row control token is embedded in your zookeeper application. When the application can run without (or other operations)

In other versions. Run the token on Vista to keep the application program in the xenocode example.

Production Line on the production system eliminates compatibility related to the deployment of legacy applications on Windows Vista

Problem. Mint's Internet Explorer 6 simulation mode allows applications based on IE-6 to be deployed in VI

Sta local desktop. On the customized desktop, the xenocode configurator can be used to prevent users from asking questions.

The confidential data system and the data source are used to create rows on a customized desktop. In Windows Vista

During deployment, UAC prompts and application failures are avoided. Full use of dynamic mode

It does not depend on any support for proxy or configuration of mobile programs, as well as the possibility of eliminating the need to use terminal security or management.

Permission. You can run it on the customized desktop and self-help terminal immediately. Unprecedented Optimized Performance and full-host failover

Different regionalized systems, the xenocode Application Programming virtualization technology can make the processing speed of your application programming basically

The speed of running the application locally is the same as that of running the application. Operating system control is not included in Zookeeper's binary application.

The limit or limit, which is used to minimize the limit. Transparent data sources further reduce the efficiency

The size of the load. Make full use of the existing management tool xenocode to establish proxy and server design so that

Application Programs of container are integrated into existing application management configurations, including Microsoft SMS, LAN

Desk management package, Novell ZENworks, and Symantec appstream. The Zookeeper application can

By using the MSI security package.

Http://www.crazycoder.cn/BlogDigest/Article76985.html

Cracked version:

Http://download.csdn.net/source/1733855

After installation, follow the steps below to register

<? XML version = "1.0" encoding = "UTF-16"?>

<Licensecertificate version = "2" publisher = "xenocode">

<Licensetype> retail </licensetype>

<Licensemodel> site </licensemodel>

<Productcode> all </productcode>

<Licenseename> Danny Su </licenseename>

<Accountnumber> 74149478e1g67edcfd64cgf054868c64 </accountnumber>

<Signature>

Bytes

284b6211033128e7cf6330908aca22278592abe2aad98e9616ca65130c2c6c0a

D5144a04913d41532f810959168d485324fd6c55f4473317da156625a00af262

Df019e69bf2c833136991e8989108bbce794c635cf3294476636d2355479f25f

</Signature>

</Licensecertificate>

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.