LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Creating an obfuscation scheme through the wizard
  • Listing obfuscation schemes

Was this helpful?

  1. CLI Tool
  2. Obfuscator

Obfuscation Schemes

Obfuscation schemes are rules that define which obfuscation techniques are enabled or disabled. You can think of schemes as a convenient shortcut to apply the same obfuscation techniques to many files

Creating an obfuscation scheme through the wizard

1. Command Initiation

To start defining your obfuscation scheme, use our wizard by entering the following command:

Command Line
cyphor obfuscation schemes create <schemeName>

Replace <schemeName> with a unique name for your scheme. This name will be used to identify and manage your scheme in future operations.

2. Panel Navigation and Selection

Once the command is executed, a panel will be displayed. Here's how to navigate and make selections:

  • Arrow Keys: Use the up and down arrow keys to scroll through the list of available obfuscation features.

  • Space Key: press the 'Space' key to toggle the status of a feature. If a feature is enabled, pressing 'Space' again will disable it.

  • Enter Key: After making your selections, press 'Enter' to save the scheme. Ensure you've reviewed your choices before saving, as this action finalizes the scheme's configuration.

Output example
Select the obfuscation settings

> [X] Symbol Renaming
  [X] Control Flow Obfuscation
  [ ] Body Mutations
  [ ] Call Hiding
  [ ] Code integrity checks
  [ ] Anti Debugger
  [ ] Virtualization
  [ ] Code Encryption
  [ ] Type Obfuscation
  [ ] Opaque Encryption

(Move up and down to reveal more obfuscation features)
(Press <space> to enable an obfuscation feature, <enter> to accept)

After selecting the obfuscation features of your preference, you will see a message indicating whether the scheme was successfully saved.

Output example
Obfuscation scheme <successfully> saved.

Listing obfuscation schemes

cyphor obfuscator scheme list
PreviousObfuscatorNextTask templates

Last updated 1 year ago

Was this helpful?