LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Manual Obfuscation
  • Template-Based Obfuscation

Was this helpful?

  1. CLI Tool
  2. Obfuscator

Protecting files

This page is dedicated to guiding you through running obfuscation jobs using our command-line interface (CLI).

There are two methods to set up obfuscation tasks, what differentiates them is solely the way in which the task is created. Below you can read about each approach and choose the one that fits your use-case best.

Manual Obfuscation

For those who are testing out different settings, manual obfuscation allows users to specify each setting on the fly. This method is perfect for first-time users or those fine-tuning their obfuscation process.

Template-Based Obfuscation

Template-based obfuscation is the go-to choice for repetitive tasks. Instead of redefining your obfuscation settings every time, you can rely on pre-defined templates that contain rules dictating how files within your project are obfuscated.

If you haven't created a template, you can read more about them here: Task templates

PreviousTask templatesNextGlobal obfuscation flags

Last updated 1 year ago

Was this helpful?