OxfuscatorAssembly Obfuscation, integrated into Visual Studio | |
Download |
Oxfuscator Ranking & Summary
Advertisement
Oxfuscator Tags
- Obfuscator visual assembly assembly obfuscation Spammer obfuscation tricks Spammer obfuscation Assembly Obfuscator Net Obfuscation Check Assembly Assembly Version assembly converter sequence assembly Assembly Information Name Obfuscation Assembly to XMI compile assembly Explore Assembly Obfuscation Technique assembly obfuscation Visual Studio obfuscator assembly description code obfuscation sonic record now facebook chat application data entry speed nokia asha 301 aif 2 dls nokia asha 200 arabic letters tracing free google background free full screen zebronics driver detective capture fax sw fantastic fun effects vmpf
Oxfuscator Description
One of the advantages of managed code is that instead of being compiled directly into native CPU instructions, it gets built into “IL”, a higher-level binary code that is abstract from the actual CPU type the executable may be run on, and which contains enough meta data that it can be analyzed and verified to be “safe” by the run time, before actual execution. The downside is that the higher-level code can also be easier to disassemble and reverse engineer, because it contains the full names of classes and their members, as well as code structures that are relatively easy to put back into Readable code. Tools such as .NET Reflector or ILDASM which ships with the .NET Framework SDK, allow developers to look at and understand the ongoings in compiled .NET assemblies. Sometimes this is not desirable, as code may contain trade secrets or confidential business logic that should not be readily accessible to users of the application. This is where so-called code obfuscation comes in. Obfuscation is a process that takes an existing .NET executable (or set of assemblies), and Processes it to make the code unreadable with tools like Reflector, without actually changing the behavior or the code itself.
Oxfuscator Related Software