LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Quick Start
  • File Encryption
  • File Upload
  • File Removal
  • You are all set

Was this helpful?

  1. .NET Code Obfuscation

Getting Started

PreviousWelcome to CyphorNextHow to Obfuscate

Last updated 1 year ago

Was this helpful?

Quick Start

Our platform is easy to use, however, at first glance you might be amused due to the number of features it has built-in.

File Encryption

File encryption is the ability that you have to keep the files stored safely in our servers. This feature was built to ensure the integrity and safety of your intellectual property. This feature is optional but highly recommended.

By enabling this feature, you will have to remember a master password that is solely owned by you. When performing actions that involve files on our website (uploading or obfuscating files), you will be asked for this key. We do not store this password, instead, we store its hash using. When you enter your master password, we will verify that the hash of the input matches with what's stored in our servers. The encryption used to protect your files is

To enable File Encryption in your account, go to this page and follow the following steps:

You can upload up to 100 files at the same time, to do that, follow the same steps but selecting or dropping the new files.

You can remove any file from our cloud at any given point. We won't keep logs or traces of the files you remove.

The next step is to obfuscate your files.

File Upload

Before using our obfuscation services, you must upload the files you want to protect and their dependencies. To do this, you mustand click the button upload files.

File Removal

To remove a file, and select the file you want to remove. This will enable the button Remove Files, clicking it will cause the files to be removed.

You are all set

🆙
❌
🎉
go to the file manager page
go to the file manager page
How to Obfuscate
📂
Argon2
Salsa20
here