{"version":1,"pages":[{"id":"-MPg4LGHODRJKvjYeB7V","title":"Welcome to Cyphor","pathname":"/","siteSpaceId":"sitesp_2PuOU","description":""},{"id":"-MT79yTq2EZ-qNhkufv6","title":"Getting Started","pathname":"/.net-code-obfuscation/getting-started","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"}]},{"id":"-McpkXL9MIztizLcsW45","title":"How to Obfuscate","pathname":"/.net-code-obfuscation/how-to-obfuscate","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"}]},{"id":"-MT6kws30pRsgkuPkDFR","title":"Basic Code Obfuscation","pathname":"/.net-code-obfuscation/code-obfuscation","siteSpaceId":"sitesp_2PuOU","description":"Obfuscation is the main feature that distinguish our service.","breadcrumbs":[{"label":".NET Code Obfuscation"}]},{"id":"-MPg4RXE5JVu5LfIxtx1","title":"Symbol Renaming","pathname":"/.net-code-obfuscation/code-obfuscation/symbol-renaming","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Basic Code Obfuscation"}]},{"id":"-MT6eKYmgIYQHnHwgnAc","title":"Body Mutation","pathname":"/.net-code-obfuscation/code-obfuscation/body-mutations","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Basic Code Obfuscation"}]},{"id":"-MPgBsroUQ3C6VPPI0No","title":"Control Flow","pathname":"/.net-code-obfuscation/code-obfuscation/control-flow","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Basic Code Obfuscation"}]},{"id":"-MT6hW8OaRTC84H5UbJj","title":"Constant Encryption","pathname":"/.net-code-obfuscation/code-obfuscation/constant-encryption","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Basic Code Obfuscation"}]},{"id":"-MT6fmNuf_ebt5N2QNBN","title":"Call Hiding","pathname":"/.net-code-obfuscation/code-obfuscation/call-hiding","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Basic Code Obfuscation"}]},{"id":"-MU_Ik6o4-Nsv8fiAXJZ","title":"Debug Protection","pathname":"/.net-code-obfuscation/code-obfuscation/debug-protection","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Basic Code Obfuscation"}]},{"id":"-MUfIqpsCrUgQ3SY9u4l","title":"Integrity Checks","pathname":"/.net-code-obfuscation/code-obfuscation/integrity-checks","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Basic Code Obfuscation"}]},{"id":"-MU_H9499VWpaQ7c-McB","title":"Self Healing","pathname":"/.net-code-obfuscation/code-obfuscation/self-healing","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Basic Code Obfuscation"}]},{"id":"-MT7WWiUPj-fEaM3ckBY","title":"Advanced Obfuscation","pathname":"/.net-code-obfuscation/advanced-obfuscation","siteSpaceId":"sitesp_2PuOU","description":"Once you are more familiar with our platform, you might want to have more control of the obfuscation process to get the most of our service. The following chapters focus on advanced obfuscation.","breadcrumbs":[{"label":".NET Code Obfuscation"}]},{"id":"-MU_I8LjgaALpE_2IDL0","title":"Attribute-Based Obfuscation","pathname":"/.net-code-obfuscation/advanced-obfuscation/attribute-based-obfuscation","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Advanced Obfuscation"}]},{"id":"-MUaDMfR90wQDI91_vN6","title":"Guide to obfuscation","pathname":"/.net-code-obfuscation/advanced-obfuscation/guide-to-obfuscation","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Advanced Obfuscation"}]},{"id":"-MT7Za2E9mrzIykaDWqH","title":"Code Inlining","pathname":"/.net-code-obfuscation/advanced-obfuscation/code-inlining","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Advanced Obfuscation"}]},{"id":"-Mc1s0s41TrneAxHCIpS","title":"What is RASP?","pathname":"/.net-code-obfuscation/advanced-obfuscation/what-is-rasp","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Advanced Obfuscation"}]},{"id":"-MU__hOJiRIk9uhIyMO3","title":"Protections that protect each other","pathname":"/.net-code-obfuscation/advanced-obfuscation/protections-that-protect-each-other","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Advanced Obfuscation"}]},{"id":"-MZEidENGHfWunB-jwPJ","title":"Program not working after obfuscation","pathname":"/.net-code-obfuscation/advanced-obfuscation/program-not-working-after-obfuscation","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Advanced Obfuscation"}]},{"id":"-MZU83VAcvUsUOp1ezAj","title":"Keeping performance with obfuscation","pathname":"/.net-code-obfuscation/advanced-obfuscation/keeping-performance-with-obfuscation","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Advanced Obfuscation"}]},{"id":"-MUc_8IuFw7u86wxisV1","title":"Virtualization","pathname":"/.net-code-obfuscation/advanced-obfuscation/troubleshooting-after-obfuscation","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":".NET Code Obfuscation"},{"label":"Advanced Obfuscation"}]},{"id":"KWvpKk27lRJ3lrYO9wpw","title":"Files","pathname":"/dashboard/files","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Dashboard"}]},{"id":"QLHxWlKjO5iDW2ZzY5B6","title":"Billing","pathname":"/dashboard/billing","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Dashboard"}]},{"id":"17XxkFALGbsdzlVdXwDl","title":"Pay as you go","pathname":"/dashboard/billing/pay-as-you-go","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Dashboard"},{"label":"Billing"}]},{"id":"AqsseCIPfBRRAleITbwE","title":"Examples","pathname":"/dashboard/billing/examples","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Dashboard"},{"label":"Billing"}]},{"id":"XZ4ZGokurtQVi7ICuzmC","title":"Projects","pathname":"/dashboard/projects","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Dashboard"}]},{"id":"BtP0tnobgbH0zKFxaHXg","title":"Code Guard Tasks","pathname":"/dashboard/projects/code-guard-tasks","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Dashboard"},{"label":"Projects"}]},{"id":"vQCuLRtQ5pXZf3DdqqX4","title":"Permissions","pathname":"/dashboard/projects/permissions","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Dashboard"},{"label":"Projects"}]},{"id":"3HN568rcgR3hCWDG4e0W","title":"Roles","pathname":"/dashboard/projects/permissions/roles","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Dashboard"},{"label":"Projects"},{"label":"Permissions"}]},{"id":"D3MIVVlKn1opzhIgRvZV","title":"Files","pathname":"/dashboard/projects/files","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Dashboard"},{"label":"Projects"}]},{"id":"6cRHsybk88BFwUvCXCC9","title":"SAML and SSO","pathname":"/dashboard/projects/saml-and-sso","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Dashboard"},{"label":"Projects"}]},{"id":"ctaWQk523ar1YcccpeD0","title":"Introduction","pathname":"/code-guard/introduction","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"5Rh1l6vPilRodO4LwVRG","title":"Implement with your licensing system","pathname":"/code-guard/implement-with-your-licensing-system","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"5cA8GwpnLYk0Oi0j2VL4","title":"Setting up a gateway","pathname":"/code-guard/implement-with-your-licensing-system/setting-up-a-gateway","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Implement with your licensing system"}]},{"id":"cMembz3bZ6ePMNilW6xD","title":"Setting up the SDK","pathname":"/code-guard/implement-with-your-licensing-system/setting-up-the-sdk","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Implement with your licensing system"}]},{"id":"KS5C3c0MW1iF0TknrFMS","title":"Secured values","pathname":"/code-guard/secured-values","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"4TsCLX0Hongk92S6UY48","title":"Dynamic values","pathname":"/code-guard/secured-values/dynamic-values","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Secured values"}]},{"id":"Mxn2RKAEaohkUzhGqtrv","title":"Code Encryption","pathname":"/code-guard/secured-values/code-encryption","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Secured values"}]},{"id":"HDVhAXfRHgIzA4zKJVd9","title":"Page 1","pathname":"/code-guard/secured-values/code-encryption/page-1","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Secured values"},{"label":"Code Encryption"}]},{"id":"6aqPDNVslCcYl9rrAQIy","title":"Preventing analysis","pathname":"/code-guard/preventing-analysis","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"4fKV8y1xhOLYRtHzxyLn","title":"Enhanced visibility","pathname":"/code-guard/enhanced-visibility","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"hgBlS4DtwPSqVne7qjk2","title":"Disabling tracing on production","pathname":"/code-guard/enhanced-visibility/disabling-tracing-on-production","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Enhanced visibility"}]},{"id":"xu4sAdevZAPgDRtgDw7h","title":"Logging external methods","pathname":"/code-guard/enhanced-visibility/logging-external-methods","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Enhanced visibility"}]},{"id":"pNQgRmNdtelJXkShytOb","title":"Optimizing Memory Usage","pathname":"/code-guard/enhanced-visibility/optimizing-memory-usage","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Enhanced visibility"}]},{"id":"yLoxfJ2q2AOlmciUwStQ","title":"Edge connectivity","pathname":"/code-guard/edge-connectivity","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"ivsZRebcc6aSHHdw9tFA","title":"Preventing modifications","pathname":"/code-guard/preventing-modifications","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"Y18RjkYZ2UO8jSvaKCkg","title":"Preventing assembly load","pathname":"/code-guard/preventing-modifications/preventing-assembly-load","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Preventing modifications"}]},{"id":"lPFow5sc8kbgIgbT8WnD","title":"Allowing partial tampering","pathname":"/code-guard/preventing-modifications/allowing-partial-tampering","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Preventing modifications"}]},{"id":"abafQ3i9gd81y3E40oY5","title":"Enterprise EDRs and XDRs","pathname":"/code-guard/preventing-modifications/enterprise-edrs-and-xdrs","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Preventing modifications"}]},{"id":"lM9qVw91fPzeBhmjWCub","title":"Dynamic Hook protection","pathname":"/code-guard/preventing-modifications/dynamic-hook-protection","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Preventing modifications"}]},{"id":"zEWfXPDQjfU6VDVXcIrR","title":"Thread hijacking","pathname":"/code-guard/preventing-modifications/thread-hijacking","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Preventing modifications"}]},{"id":"4LZzLEfSfsUn8as3PoVG","title":"Guard Checksums","pathname":"/code-guard/preventing-modifications/guard-checksums","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Preventing modifications"}]},{"id":"qrvTNbnSlyRtSiMgRXTZ","title":"DLL Injection","pathname":"/code-guard/preventing-modifications/dll-injection","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Preventing modifications"}]},{"id":"XS5av3daJYY8giQn2zez","title":"Handling complex RE attacks","pathname":"/code-guard/preventing-modifications/handling-complex-re-attacks","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Preventing modifications"}]},{"id":"3URvk8rK8WEQaqrGOFWe","title":"Custom payload detection","pathname":"/code-guard/preventing-modifications/handling-complex-re-attacks/custom-payload-detection","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Preventing modifications"},{"label":"Handling complex RE attacks"}]},{"id":"03VygvpIGwnH66IcCE22","title":"Granular Integrity Checks","pathname":"/code-guard/granular-integrity-checks","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"c4rYmjqm0zSxVAN6eMBr","title":"Virtualized Environments","pathname":"/code-guard/virtualized-environments","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"b54H6o9nHIG8ZbNbIlvc","title":"Troubleshooting","pathname":"/code-guard/troubleshooting","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"2rRMWqpitOTgK8I0JY7w","title":"Threat database","pathname":"/code-guard/threat-database","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"4KFqqoNrWfXCX3bNJe3x","title":"Real time alerts","pathname":"/code-guard/real-time-alerts","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"}]},{"id":"lAJnHBkHlCgSjK2gptMs","title":"Alert Insights","pathname":"/code-guard/real-time-alerts/alert-insights","siteSpaceId":"sitesp_2PuOU","description":"","breadcrumbs":[{"label":"Code Guard"},{"label":"Real time alerts"}]},{"id":"LG9vMUgh1qDMV2i2P3gb","title":"Introduction","pathname":"/cli-tool/introduction","siteSpaceId":"sitesp_2PuOU","description":"Our Command Line Interface (CLI) provides a unified method for interacting with all of our product  offerings.","breadcrumbs":[{"label":"CLI Tool"}]},{"id":"RZ3JFfLxwCkAAklPhIEQ","title":"Global options","pathname":"/cli-tool/global-options","siteSpaceId":"sitesp_2PuOU","description":"This section details all the Global Options available in our CLI. These options can be applied universally across all commands.","breadcrumbs":[{"label":"CLI Tool"}]},{"id":"j50sf3sXBcdte7NndTpG","title":"Profiles","pathname":"/cli-tool/profiles","siteSpaceId":"sitesp_2PuOU","breadcrumbs":[{"label":"CLI Tool"}]},{"id":"CrCerh8bEEgm6aN3xXrW","title":"Projects","pathname":"/cli-tool/projects","siteSpaceId":"sitesp_2PuOU","breadcrumbs":[{"label":"CLI Tool"}]},{"id":"w6uQ0DqvikDVLqQTrVBV","title":"Obfuscator","pathname":"/cli-tool/obfuscator","siteSpaceId":"sitesp_2PuOU","description":"This section focuses on managing and customizing obfuscation settings using our Command Line Interface (CLI). Here, you'll learn about obfuscation schemes, templates and protecting files.","breadcrumbs":[{"label":"CLI Tool"}]},{"id":"HyFXHE7DRpiWmBA6f5rw","title":"Obfuscation Schemes","pathname":"/cli-tool/obfuscator/obfuscation-schemes","siteSpaceId":"sitesp_2PuOU","description":"Obfuscation schemes are rules that define which obfuscation techniques are enabled or disabled. You can think of schemes as a convenient shortcut to apply the same obfuscation techniques to many files","breadcrumbs":[{"label":"CLI Tool"},{"label":"Obfuscator"}]},{"id":"4792WGNIHbte3pLOVSsA","title":"Task templates","pathname":"/cli-tool/obfuscator/task-templates","siteSpaceId":"sitesp_2PuOU","description":"Simplify the process of running obfuscation jobs by creating pre-defined configurations for everything involving the obfuscation process.","breadcrumbs":[{"label":"CLI Tool"},{"label":"Obfuscator"}]},{"id":"HyG1li89TbMNvWcaAUcD","title":"Protecting files","pathname":"/cli-tool/obfuscator/protecting-files","siteSpaceId":"sitesp_2PuOU","description":"This page is dedicated to guiding you through running obfuscation jobs using our command-line interface (CLI).","breadcrumbs":[{"label":"CLI Tool"},{"label":"Obfuscator"}]},{"id":"kYcfD7lAgEaTvT3d6lO5","title":"Global obfuscation flags","pathname":"/cli-tool/obfuscator/protecting-files/global-obfuscation-flags","siteSpaceId":"sitesp_2PuOU","breadcrumbs":[{"label":"CLI Tool"},{"label":"Obfuscator"},{"label":"Protecting files"}]},{"id":"gjyLuzcqVKc4NjqXhxB3","title":"Using templates to obfuscate files","pathname":"/cli-tool/obfuscator/protecting-files/using-templates-to-obfuscate-files","siteSpaceId":"sitesp_2PuOU","breadcrumbs":[{"label":"CLI Tool"},{"label":"Obfuscator"},{"label":"Protecting files"}]},{"id":"073SkfRPIPH41AlJDfKP","title":"Quick obfuscation","pathname":"/cli-tool/obfuscator/protecting-files/quick-obfuscation","siteSpaceId":"sitesp_2PuOU","description":"Quick obfuscation allows you to rapidly iterate through various obfuscation settings before deciding on a template tailored to your specific requirements.","breadcrumbs":[{"label":"CLI Tool"},{"label":"Obfuscator"},{"label":"Protecting files"}]},{"id":"WYTZgJlXASlCFcaEngBN","title":"Monitoring obfuscation jobs","pathname":"/cli-tool/obfuscator/monitoring-obfuscation-jobs","siteSpaceId":"sitesp_2PuOU","breadcrumbs":[{"label":"CLI Tool"},{"label":"Obfuscator"}]},{"id":"FzFTmKlDhBVyaPk6HrG0","title":"Securing local storage","pathname":"/cli-tool/securing-local-storage","siteSpaceId":"sitesp_2PuOU","description":"Your keys and secrets are securely stored in a local folder automatically managed by the CLI. However, you can tailor the protection mechanisms to fit your specific security needs.","breadcrumbs":[{"label":"CLI Tool"}]}]}