LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Before we start
  • Choosing files to protect
  • Choosing Dependencies
  • Choosing files to merge
  • Wrapping up

Was this helpful?

  1. .NET Code Obfuscation

How to Obfuscate

PreviousGetting StartedNextBasic Code Obfuscation

Last updated 1 year ago

Was this helpful?

Before we start

This page assumes that files have already been uploaded to the platform. If you are new to the platform, We advise to check out the

Choosing files to protect

On the obfuscation page, you will see a list of files. The first step is to choose the files that you want to protect. To do that, you have to left-click on the files and then mark them to obfuscate.

There are some tricks that you can follow to make this process easier. You can hold the control key of your keyboard and select multiple files at the same time.

Simultaneously, you can select many files by selecting one file and then selecting another one while pressing the shift key.

To unmark a file, simply click "Obfuscate Selected" again.

Dependencies are any library that your application uses to function. Our obfuscator requires them to analyze and protect your files accurately. Not providing the correct dependencies will lead to errors in the obfuscation stage.

Our obfuscator will not deliver corrupted files due to missing dependencies, instead, while running the obfuscation task you will receive an error message stating that there are missing dependencies. If possible, our engine will list the missing files.

The merge feature allows you to link your dependencies into one single binary. Mark the dependencies that you want to merge to have them linked with your main application.

Using our merger along with obfuscation will increase the overall security of the obfuscation.

After all the steps listed are satisfied, you are ready to click Create Task to begin with the obfuscation.

Choosing Dependencies

Generally speaking, you should upload the entire Release folder of your application.

Choosing files to merge

Wrapping up

📂
🧠
📎
🎁
⚠️
🛡️
Getting Started Page.
Getting Started