LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Introduction
  • Creating a task template

Was this helpful?

  1. CLI Tool
  2. Obfuscator

Task templates

Simplify the process of running obfuscation jobs by creating pre-defined configurations for everything involving the obfuscation process.

Introduction

Task templates act as a named reference to both a specific project folder and predetermined obfuscation settings. This feature helps avoid the redundancy of entering detailed folder paths and obfuscation settings for each obfuscation iteration.

Instead, you can create a task template, assign it a unique name, and subsequently refer to this name when running obfuscation tasks.

Creating a task template

To create a new task template, use the following command:

Command Line input
cyphor obfuscator task create <TEMPLATE_NAME> <FOLDER_TARGET>

Parameters Explained:

  • <TEMPLATE_NAME>: Assign a unique name to your task template. This name will be used to identify and execute the template in future operations.

  • <FOLDER_TARGET>: Specify the directory or folder path where the obfuscation process will be applied. Ensure the path is correct to avoid any processing errors.

1. Selecting Dependencies to Merge: Dependency merging links multiple assemblies into a single file. This step enhances the compactness and can sometimes improve the performance of the obfuscation process.

Command Line output
Select the dependencies you want to merge

> [X] Dependency1.dll
  [ ] Dependency2.dll
  [X] Dependency3.dll
  [ ] Dependency4.dll
  [ ] MainFile.dll

(Move up and down to reveal more files)
(Press <space> to mark a file for merging, <enter> to continue)

2. Choosing Files for Obfuscation: In this step, you'll specify which files require obfuscation.

Command Line output
Select the files you want to obfuscate

> [X] Dependency1.dll
  [ ] Dependency2.dll
  [X] Dependency3.dll
  [ ] Dependency4.dll
  [ ] MainFile.dll

(Move up and down to reveal more files)
(Press <space> to mark a file for obfuscation, <enter> to continue)

After making your selection, you'll be prompted to determine the obfuscation techniques for each file.

3. Specifying Obfuscation Techniques: You have two option:

  • Individual Settings: Manually specify the obfuscation settings for a file.

4. Storing the Task Template: Once all configurations are set, the task template will be saved to your system. This ensures you can quickly apply the same configurations in future obfuscation jobs.

PreviousObfuscation SchemesNextProtecting files

Last updated 1 year ago

Was this helpful?

Use an Obfuscation Scheme: Apply a pre-defined to the file. If you choose this option, you'll be asked which scheme to apply.

obfuscation scheme