LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Fingerprint your builds (--fingerprint)
  • Obfuscation channel (--chanel)
  • Build hash (--hash)

Was this helpful?

  1. CLI Tool
  2. Obfuscator
  3. Protecting files

Global obfuscation flags

There are global obfuscations flags available, regardless of the method you choose to set up your obfuscation job. These flags offer you greater flexibility and control in the obfuscation process. Here are the flags you can use.

Fingerprint your builds (--fingerprint)

This flag allows you to inject a unique identifier into the protected file. You can specify any string, helping you easily track and identify the obfuscated file.

Obfuscation channel (--chanel)

This flag lets you specify the source that's generating the obfuscation task. You can input any string that helps in identifying the source when reviewing obfuscation logs. For instance, specifying values like git, git-commit, or cli can assist in differentiating the tasks based on their origin.

Build hash (--hash)

Use this flag to indicate the hash of the build, commit, file, or any other relevant component. By doing so, you can easily track and pinpoint the exact source or version of obfuscation.

PreviousProtecting filesNextUsing templates to obfuscate files

Last updated 1 year ago

Was this helpful?