Introduction:Front-end code is a direct burst in the browser, many web attacks are directly debug business logic to find vulnerabilities to attack, in addition to some like "for nothing" molecular violence to steal other people's web page simple modification to profit, overall is the front-end logic is too easy to read, This article mainly based on JavaScript obfuscator introduce the basic idea of front-end confusion.First, JavaScript
This is a page prepared for the English readers, simplified Chinese and links to sites not reproduced
PowerBuilder PBD obfuscator 2010.05.4
Pbobfuscator v2010.05.4
Keyword:
Obfuscator, pbprotect, PowerBuilder obfuscator, decomplier, pbguard, PowerBuilder protect, depb, shudepb, decompiler, pbkiller, pbprotect
My-site: http://www.mis2erp.com/soft/PowerbuilderP
Free. netframework obfuscation tool Babel obfuscator GuiThe GUI tool of Babel obfuscatorThis tools support Babel obfuscator 1.3 and later:Most of the tools I found that can be used to obfuscate Silverlight Code are not free. but the Babel obfuscator by Albert to ferrazzoli is an open source. net obfuscator that can be
Android_Proguard code obfuscator, androidproguard
1. obfuscators Overview
Is an important protection method.
Obfuscators are integrated into android build systems, so you do not have to call them manually. At the same time, obfuscators run only when building applications in release mode, so you do not have to deal with obfuscation code when building a program in debug mode. This document describes how to enable and configure obfuscators, and decod
Android_Proguard code obfuscator
1. obfuscators Overview
Is an important protection method.
Obfuscators are integrated into android build systems, so you do not have to call them manually. At the same time, obfuscators run only when building applications in release mode, so you do not have to deal with obfuscation code when building a program in debug mode. This document describes how to enable and configure obfuscators, and decode the stack trace
Obfuscator. SCX, obfuscator, which can be downloaded.
Work logic:(1) Select the source directory and source file (PRG/VCX/SCX ).Note:: Variables are obfuscated only when they are defined by local or lparameters..(2) select the target directory (which must not have the same name as the source file)(3) copy the source directory file to the target directory, and then enable obfuscation.
This logic avoids m
Because of the requirements of the project, the C code needs to be confused. The. NET and Java obfuscation tools are now very useful. But there are not many C obfuscation tools.Find a Stunnix C + + obfuscator http://www.stunnix.com/There are few tutorials on the web, only slowly groping.The official website can download the trial version.1. Open after installation that's it.2. There are only three main menus and navigation in the upper right corner wh
Spices. NET obfuscator controls are used to prevent your. NET software from being reverse-engineered, tampered with, or unauthorized to use by hackers, competitors, or prying eyes, and this tool is available. NET code obfuscation, protection and optimization, etc., to fully protect your. NET code and data security. Spices.net Obfuscator re-build your. NET assembly is a new format that cannot be disassembled
Proguard is a cool obfuscator and shrinking tool (shrinker, please let me know if you have a better translation method ). In addition to obfuscation and protection of your code, it can also automatically detect and delete unused classes, methods, and data members, and remove the package hierarchy, minimize your jar package.Another notable significance of using proguard is that it can automatically delete unused parts, so you can safely use module-Leve
Java obfuscator logging guard
Java obfuscators retroguard-v2.3.1JavaCodeThe. Class generated after compilation containsSource codeAll information in (excluding comments), especially when debugging information is saved. Therefore, a normally compiled java. Class file can be decompiled very easily. There are many decompilation tools, one of which is very powerful is Jad.To avoid this situation and protect developers' work, another tool called Java
Spices. NET obfuscator controls are used to prevent your. NET software from being reverse-engineered, tampered with, or unauthorized to use by hackers, competitors, or prying eyes, and this tool is available. NET code obfuscation, protection and optimization, etc., to fully protect your. NET code and data security. Spices.net Obfuscator re-build your. NET assembly is a new format that cannot be disassembled
Http://msdn.microsoft.com/zh-cn/library/ms227241.aspx
. Net obfuscator -- dotfuscator community edition by preemptive Solutions
Independent GUI Quick Start
Content type: Devdiv2. Transform: orcas2mtps.xslt. -->
This section describes how to use the independent GUI of dotfuscator. For a complete guide to the dotfuscator user interface, see GUI reference. Step 1 -- start dotfuscator Gui
Click Start |Program"|" Preempti
How to Use xenocode
Usage 1:
1. Clarification: obfuscation, encryption, or obfuscation! = Encryption2. Import the DOTNET program or assembly file (. dll/. EXE) to be encrypted)3. Select "Protect" on the second tab"4. Click "select
Shanhai software production line (Personal Edition
,
Abbreviation
Pspl
) Is
Sea
Architecture
C #
Development platform.
Used for individual developers to develop standalone andC/SAnd provide related tool support for the software
Http://www.javascript-source.com/
Before Obfuscation
Copy
Save
// Detect which browser is used VaR Detect = navigator. useragent. tolowercase (); VaR OS, browser, version, total, thestring; If (Checkit ( 'Konqueror' ) {Browser =
A period of time ago wrote a JS data validation, JS email verification, JS URL verification, JS length verification, JS digital verification, such as pop-up dialog box form but, now not very popular kind of very unfriendly way, so rewrite a, packaged better, more friendly la
Some time ago I wrote a pop-up dialog box for js data verification, js email verification, js url verification, js length verification, and js digital verification. However, the unfriendly method is not very popular, so I wrote a new one, which is encapsulated better and sha
. style. cursor = "default ";
3. Document. Links get all links on the page
VaRLinks =Document. links;VaRArnames =[];For(VaRIInLinks) {arnames. Push (Links [I]);}For(VaRIInArnames) {document. Write (arnames [I]);}
Usage: Use the firebug plug-in of Firefox to run on the Sina homepage.
4. js onchange event, try throw catch for Form Verification
User Name Password Nbsp; Code
5. js shields all
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.