LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Use Cases
  • Command Format
  • FAQ

Was this helpful?

  1. CLI Tool
  2. Obfuscator
  3. Protecting files

Quick obfuscation

Quick obfuscation allows you to rapidly iterate through various obfuscation settings before deciding on a template tailored to your specific requirements.

Use Cases

  1. Initial Product Testing: Instead of adjusting templates and executing obfuscation commands repeatedly, you can swiftly navigate through different settings.

  2. DevOps Environments: If your DevOps systems can't interpret environment variables or store files, it might be better to pass the entire obfuscation command to the CLI each time.

Command Format

The quick obfuscation command builds upon the global templates with the following syntax:

cyphor obfuscator protect --scheme --obfuscate-file --add-obfuscation --dependency

Command Options:

  • scheme: Specifies an obfuscation scheme. For more information on obfuscation schemes, refer to Obfuscation Schemes

  • obfuscate-file: Designates the path of the file(s) you wish to obfuscate. You can specify multiple file paths.

  • add-obfuscation: Incorporates a chosen obfuscation technique. You can include multiple techniques. Every file tagged with "obfuscate-file" will inherit these techniques.

  • dependency: Indicates a file that acts as a dependency for your program. Typically, dependencies include .dll files located in your release directory.

FAQ

Isn't modifying a scheme as tedious as altering a template? Why is a scheme provided as a parameter?

The Command Line Interface (CLI) comes equipped with built-in schemes, pre-defined in the environment.

Rather than specifying rules via the add-obfuscation parameter, you have the convenience of leveraging existing schemes—either managed by us or customized by you—and subsequently appending new obfuscation techniques as required.

What is the purpose of specifying dependencies?

Specifying dependencies is crucial as our obfuscator relies on analyzing your file dependencies to accurately implement certain transformations. In the absence of these dependencies, specific obfuscation techniques might not be applied correctly, leading to a failed obfuscation process.

Is it possible to omit specifying dependencies?

Yes, it's permissible to bypass specifying dependencies, provided that the obfuscation techniques you opt for don't require dependency analysis.

PreviousUsing templates to obfuscate filesNextMonitoring obfuscation jobs

Last updated 1 year ago

Was this helpful?