List of commonly used tools [more common]
Obfuscators, encryption |
Dotfuscator |
Vs default tool, butCommunityVersion Low Intensity |
DOTNET Reactor |
Nativecode and obfuscation are used |
Xenocode postbuild |
Professional tools |
{Smartassembly}. setup. MSI |
|
Decompilation Tool |
Reflector |
One of the most prestigious tools, many open-source plug-ins |
Xenocode Fox |
Professional tools, commercial version |
Ildasm |
Vs Tool |
Component merging and virtual tools: tools that facilitate software release, such as merging multiple DLL files |
Xenocode Studio |
All components and the. NET Framework involved can be stored in an execution file, which simplifies deployment and installation. |
Dotfuscator |
Component Merging |
[During processing, pay attention to whether to select a database file or an execution file. The two methods are not the same. Before release, use the above decompilation to verify whether the processing is correct. This can be a protection function.]
Tool can find the name
Dotnetreactor.rar
Xenocode=postbuild=2010+for#.net.rar: available
Xenocode_virtual_application_studio_isv_edition.msi
Xenocodefox2007_v5.2_build_6675.rar: Fox is available, and others need to be connected.
{Smartassembly}. setup. MSI
Dotfuscatorpe42_rt20.zip
Network Information
Http://www.cnblogs.com/jason_z/archive/2009/10/19/1585804.html
Share: Several code obfuscators (dotfuscator,. Net reactor, xenocode)
Before introducing the tool, I need to describe the following points:
1. If the software you wrote does not involve commercial purposes, I do not recommend it in the light of the open source idea.CodeObfuscators
2. There are some risks when using the code obfuscator. It is best to back up the relevant code before use.
3. obfuscators cannot be used for any code that needs to be serialized into binary. The obfuscated code cannot be serialized normally! [After obfuscation of the domain name of the class, it is different after serialization]
Dotfuscator is a built-in code obfuscator in vs. Vs -- tool -- dotfuscator community Edition
Specific Use method, and the confusion effect, can refer to: http://blog.csdn.net/netjxz/archive/2006/12/12/1439866.aspx
. Net reactor, which is very small and free of installation and does not need to be registered. He only changes the code to a random code, but the obfuscated code can be used normally.
The specific use method is relatively simple,: http://files.cnblogs.com/ghost79/DotNETReactor.rar
Xeoncode is a relatively more professional code obfuscation software.ProgramIt can shield some decompilation tools (such as ildasm). The specific usage is as follows:
Usage 1:
1. Import the DOTNET program or assembly file (. dll/. EXE) to be encrypted)
2. Select "Protect" on the second tab"
3. Click "select pattern"
4. Select All "object types" and all "visiblility"
5. Select "Do not obfuscate" for "action" and apply, and set all content to not be confused.
6. Select "obfuscate" for "action", select "private" for "visibility", and apply
7. Press "xenocode assemblies" in the lower right corner to export the obfuscated File
Usage 2:
1. Select the application tag
2. Click the Add button to load the DLL and exe files to be confused.
3. If it is a DLL file, select the second item in the preset list box. Otherwise, select the first item.
4. Click Apply.
5. Select the protect tag
6. Select the supress other reflection tools check box.
7. Click Select string to set
8. Click the xenocode button to complete obfuscation.
9. replace another file until all the files are obfuscated!
The above is taken from the network and is for reference only.
2009 latest version, the registered license is also in the compressed package
: Http://d.download.csdn.net/down/1702658/Danny_Su
Http://seednet.to/html2/v5199.htm
Xenocode R virtual application studio allows you to customize and configure your
Desktop application, which can be deployed anywhere immediately.
New Features of virtual application studio:
Applications that deploy a zookeeper in a single, customizable line interface can be configured first in a single line.
Deploy the application programs and zookeeper in zookeeper that can be run anywhere immediately. Eliminate Security
Perform step-by-step failover, configure with slave, DLL hell, or disable failover. The xenocode runtime application does not need to be replaced
Manage or set operation. If you do not have a basic configuration change, you can place your website applications on the standard network.
Or the website, so that it can be used immediately by the user. Active Directory, streaming server, or other
. When concurrent. NET and Java applications do not need to run, the server guard can distribute distributed operations through a few clicks.
The row control token is embedded in your zookeeper application. When the application can run without (or other operations)
In other versions. Run the token on Vista to keep the application program in the xenocode example.
Production Line on the production system eliminates compatibility related to the deployment of legacy applications on Windows Vista
Problem. Mint's Internet Explorer 6 simulation mode allows applications based on IE-6 to be deployed in VI
Sta local desktop. On the customized desktop, the xenocode configurator can be used to prevent users from asking questions.
The confidential data system and the data source are used to create rows on a customized desktop. In Windows Vista
During deployment, UAC prompts and application failures are avoided. Full use of dynamic mode
It does not depend on any support for proxy or configuration of mobile programs, as well as the possibility of eliminating the need to use terminal security or management.
Permission. You can run it on the customized desktop and self-help terminal immediately. Unprecedented Optimized Performance and full-host failover
Different regionalized systems, the xenocode Application Programming virtualization technology can make the processing speed of your application programming basically
The speed of running the application locally is the same as that of running the application. Operating system control is not included in Zookeeper's binary application.
The limit or limit, which is used to minimize the limit. Transparent data sources further reduce the efficiency
The size of the load. Make full use of the existing management tool xenocode to establish proxy and server design so that
Application Programs of container are integrated into existing application management configurations, including Microsoft SMS, LAN
Desk management package, Novell ZENworks, and Symantec appstream. The Zookeeper application can
By using the MSI security package.
Http://www.crazycoder.cn/BlogDigest/Article76985.html
Cracked version:
Http://download.csdn.net/source/1733855
After installation, follow the steps below to register
<? XML version = "1.0" encoding = "UTF-16"?>
<Licensecertificate version = "2" publisher = "xenocode">
<Licensetype> retail </licensetype>
<Licensemodel> site </licensemodel>
<Productcode> all </productcode>
<Licenseename> Danny Su </licenseename>
<Accountnumber> 74149478e1g67edcfd64cgf054868c64 </accountnumber>
<Signature>
Bytes
284b6211033128e7cf6330908aca22278592abe2aad98e9616ca65130c2c6c0a
D5144a04913d41532f810959168d485324fd6c55f4473317da156625a00af262
Df019e69bf2c833136991e8989108bbce794c635cf3294476636d2355479f25f
</Signature>
</Licensecertificate>