LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Obfuscation schemes
  • Obfuscation Templates
  • Protecting files

Was this helpful?

  1. CLI Tool

Obfuscator

This section focuses on managing and customizing obfuscation settings using our Command Line Interface (CLI). Here, you'll learn about obfuscation schemes, templates and protecting files.

Obfuscation schemes

An obfuscation scheme is a collection of obfuscation features that you can either enable or disable according to your requirements. Schemes aren't tied to files or projects. You can learn more about schemes here: Obfuscation Schemes

Obfuscation Templates

Obfuscation Templates are a set of rules that determine how a project is obfuscated. They specify which files within the project are subjected to obfuscation, merging (or both), along with other obfuscation related settings. You can learn more about templates here: Task templates

Protecting files

You can apply predefined obfuscation schemes, use templates, or directly define obfuscation settings to meet your specific needs. For an in-depth guide on file protection, see Protecting files

PreviousProjectsNextObfuscation Schemes

Last updated 1 year ago

Was this helpful?