Introduction:Front-end code is a direct burst in the browser, many web attacks are directly debug business logic to find vulnerabilities to attack, in addition to some like "for nothing" molecular violence to steal other people's web page simple modification to profit, overall is the front-end logic is too easy to read, This article mainly based on JavaScript obfuscator introduce the basic idea of front-end confusion.First, JavaScript
This is a page prepared for the English readers, simplified Chinese and links to sites not reproduced
PowerBuilder PBD obfuscator 2010.05.4
Pbobfuscator v2010.05.4
Keyword:
Obfuscator, pbprotect, PowerBuilder obfuscator, decomplier, pbguard, PowerBuilder protect, depb, shudepb, decompiler, pbkiller, pbprotect
My-site: http://www.mis2erp.com/soft/PowerbuilderP
Free. netframework obfuscation tool Babel obfuscator GuiThe GUI tool of Babel obfuscatorThis tools support Babel obfuscator 1.3 and later:Most of the tools I found that can be used to obfuscate Silverlight Code are not free. but the Babel obfuscator by Albert to ferrazzoli is an open source. net obfuscator that can be
Android_Proguard code obfuscator, androidproguard
1. obfuscators Overview
Is an important protection method.
Obfuscators are integrated into android build systems, so you do not have to call them manually. At the same time, obfuscators run only when building applications in release mode, so you do not have to deal with obfuscation code when building a program in debug mode. This document describes how to enable and configure obfuscators, and decod
Android_Proguard code obfuscator
1. obfuscators Overview
Is an important protection method.
Obfuscators are integrated into android build systems, so you do not have to call them manually. At the same time, obfuscators run only when building applications in release mode, so you do not have to deal with obfuscation code when building a program in debug mode. This document describes how to enable and configure obfuscators, and decode the stack trace
Obfuscator. SCX, obfuscator, which can be downloaded.
Work logic:(1) Select the source directory and source file (PRG/VCX/SCX ).Note:: Variables are obfuscated only when they are defined by local or lparameters..(2) select the target directory (which must not have the same name as the source file)(3) copy the source directory file to the target directory, and then enable obfuscation.
This logic avoids m
Because of the requirements of the project, the C code needs to be confused. The. NET and Java obfuscation tools are now very useful. But there are not many C obfuscation tools.Find a Stunnix C + + obfuscator http://www.stunnix.com/There are few tutorials on the web, only slowly groping.The official website can download the trial version.1. Open after installation that's it.2. There are only three main menus and navigation in the upper right corner wh
Spices. NET obfuscator controls are used to prevent your. NET software from being reverse-engineered, tampered with, or unauthorized to use by hackers, competitors, or prying eyes, and this tool is available. NET code obfuscation, protection and optimization, etc., to fully protect your. NET code and data security. Spices.net Obfuscator re-build your. NET assembly is a new format that cannot be disassembled
Proguard is a cool obfuscator and shrinking tool (shrinker, please let me know if you have a better translation method ). In addition to obfuscation and protection of your code, it can also automatically detect and delete unused classes, methods, and data members, and remove the package hierarchy, minimize your jar package.Another notable significance of using proguard is that it can automatically delete unused parts, so you can safely use module-Leve
Java obfuscator logging guard
Java obfuscators retroguard-v2.3.1JavaCodeThe. Class generated after compilation containsSource codeAll information in (excluding comments), especially when debugging information is saved. Therefore, a normally compiled java. Class file can be decompiled very easily. There are many decompilation tools, one of which is very powerful is Jad.To avoid this situation and protect developers' work, another tool called Java
Spices. NET obfuscator controls are used to prevent your. NET software from being reverse-engineered, tampered with, or unauthorized to use by hackers, competitors, or prying eyes, and this tool is available. NET code obfuscation, protection and optimization, etc., to fully protect your. NET code and data security. Spices.net Obfuscator re-build your. NET assembly is a new format that cannot be disassembled
Http://msdn.microsoft.com/zh-cn/library/ms227241.aspx
. Net obfuscator -- dotfuscator community edition by preemptive Solutions
Independent GUI Quick Start
Content type: Devdiv2. Transform: orcas2mtps.xslt. -->
This section describes how to use the independent GUI of dotfuscator. For a complete guide to the dotfuscator user interface, see GUI reference. Step 1 -- start dotfuscator Gui
Click Start |Program"|" Preempti
How to Use xenocode
Usage 1:
1. Clarification: obfuscation, encryption, or obfuscation! = Encryption2. Import the DOTNET program or assembly file (. dll/. EXE) to be encrypted)3. Select "Protect" on the second tab"4. Click "select
Shanhai software production line (Personal Edition
,
Abbreviation
Pspl
) Is
Sea
Architecture
C #
Development platform.
Used for individual developers to develop standalone andC/SAnd provide related tool support for the software
Http://www.javascript-source.com/
Before Obfuscation
Copy
Save
// Detect which browser is used VaR Detect = navigator. useragent. tolowercase (); VaR OS, browser, version, total, thestring; If (Checkit ( 'Konqueror' ) {Browser =
FeaturesHere's a pseudo random list of the things it would do depending on what obfuscator is used to obfuscate an assembly:
Inline methods. Some obfuscators Move Small parts of a method to another static method and calls it.
Decrypt strings statically or dynamically
Decrypt other constants. Some Obfuscators can also encrypt other constants, such as all integers, all doubles, etc.
Decrypt methods statically or dynamically
Remove proxy meth
0x00 Project Introduction
OBFUSCATOR-LLVM is a project initiated in June, by the information security group of the University of applied S and Arts Western Switzerland of Yverdon-les-bains (HEIG-VD).
The aim of this project was to provide a open-source fork of the LLVM compilation suite able to provide increased software Security through code obfuscation and tamper-proofing. As we currently mostly work at the intermediate representation (IR) level, o
-Champaign, founder Chrislattner, and is currently the head of Apple's developer tools Division. OBFUSCATOR-LLVM (OLLVM) is a code obfuscation tool developed by the Northwestern University of Applied Sciences Security Laboratory for LLVM compiled components, which is fully open source to increase the difficulty of reverse engineering and ensure the security of the code. OBFUSCATOR-LLVM (OLLVM) integrates c
Free. Net obfuscation and decompilation tools
I. netCodeObfuscation
. Net code obfuscation technology:
Symbol renaming
String encryption and Compression
Resource encryption and Compression
Constant literals pruning
Method signatures overload Induction
Class hierarchy linerization
Code control flow Obfuscation
Assemblies merging and embedding
XML documentation Filter
Free. Net code obfuscation tool:
Eazfuscator. net
Http://www.foss.kharkov.ua/g1/projects/eaz
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.