Obfuscation Schemes

Obfuscation schemes are rules that define which obfuscation techniques are enabled or disabled. You can think of schemes as a convenient shortcut to apply the same obfuscation techniques to many files

Creating an obfuscation scheme through the wizard

1. Command Initiation

To start defining your obfuscation scheme, use our wizard by entering the following command:

Command Line
cyphor obfuscation schemes create <schemeName>

Replace <schemeName> with a unique name for your scheme. This name will be used to identify and manage your scheme in future operations.

2. Panel Navigation and Selection

Once the command is executed, a panel will be displayed. Here's how to navigate and make selections:

  • Arrow Keys: Use the up and down arrow keys to scroll through the list of available obfuscation features.

  • Space Key: press the 'Space' key to toggle the status of a feature. If a feature is enabled, pressing 'Space' again will disable it.

  • Enter Key: After making your selections, press 'Enter' to save the scheme. Ensure you've reviewed your choices before saving, as this action finalizes the scheme's configuration.

Output example
Select the obfuscation settings

> [X] Symbol Renaming
  [X] Control Flow Obfuscation
  [ ] Body Mutations
  [ ] Call Hiding
  [ ] Code integrity checks
  [ ] Anti Debugger
  [ ] Virtualization
  [ ] Code Encryption
  [ ] Type Obfuscation
  [ ] Opaque Encryption

(Move up and down to reveal more obfuscation features)
(Press <space> to enable an obfuscation feature, <enter> to accept)

After selecting the obfuscation features of your preference, you will see a message indicating whether the scheme was successfully saved.

Output example
Obfuscation scheme <successfully> saved.

Listing obfuscation schemes

cyphor obfuscator scheme list

Last updated