Search the Community

Showing results for tags 'obfuscator'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 5 results

  1. Supported Applications: All 32-bit, 64-bit and “Any CPU” apps, including Console, GUI, Windows Forms (WinForms), WPF and ASP.Net apps, libraries, components, controls, VSTO based Word/Excel/Outlook/etc Office Add-Ins, Windows Services & WCF Services. Obfuscated apps are FIPS compliant. Supported Tools: All editions of Visual Studio 2013, Visual Studio 2012, Visual Studio 2010, Visual Studio 2008, Visual Studio 2005, Visual Studio 2003, Visual Studio 2002. Supported .Net Frameworks: All from .Net Framework 1.0 to .Net Framework 4.5. Supported Languages: All managed languages including C#, Visual Basic.Net (VB.Net), Managed C++, J# and many others. .Net Compact Framework: 1.1, 2.0, 3.5 & 4.0. Silverlight: 2.0, 3.0, 4.0 and 5.0 including Silverlight for Windows Phone 7.0/7.5/8.0 and above. Metro Framework: Supports Windows 8 Metro/WinRT apps. XNA Framework: 2.0, 3.0 & 4.0 .Net Micro Framework: 3.0 & 4.0 Additional Frameworks Supported: Mono Assemblies and Mono-Android Assemblies and Unity3D assemblies. Supported OS: 32-bit (x86) and 64-bit (x64) versions of: Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2008, Windows 2003, Windows 2000, Windows Me, Windows 98, Windows NT [Hidden Content] [HIDE][Hidden Content]] Pass: level23hacktools.com
  2. sQuoII

    Free .NET obfuscator

    Free .NET obfuscator is an online obfuscation tool that helps protect .NET exes and dlls against reverse-engineering by making it difficult for a third-party to access your source code. [HIDE][Hidden Content]]
  3. sQuoII

    Specter Obfuscator + Source

    This Application will obfuscate your .NET Assembly Features -Symbol Renaming -AntiILDasm -Constant Protection -Constant Mutation [HIDE][Hidden Content]] Pass: level23hacktools.com
  4. Noisette (nuts in French) is aimed to be an open-source C# Obfuscator for .NET assembly built with dnlib, WPF and my humble coding skills. Noisette is the first .NET obfuscated meant to be a nuts-breaker for both the decompiler and the hacker. Start Noisette.exe, drag and drop a .NET file on it, and magic should happen. It will create a "%yourfile%_protected" output in the same folder. What features does it have? For the moment, only a few, if you want a really strong ready-to-use Obfuscator have a look at NETGuard.io Constant Outlinning Strings Outlinning Renaming Invalid Metadata Injection Tool [HIDE][Hidden Content]] Source Code [HIDE][Hidden Content]]
  5. dEEpEst

    VB6 Obfuscator

    Module1.bas Option Explicit Public Function CheckLicense1() As Boolean 'Only Public to show it doesn't matter. CheckLicense1 = True End Function Private Sub Main() With New Security If CheckLicense1() And .CheckLicense2() Then MsgBox "Ok" Else MsgBox "Failed", vbOKOnly Or vbExclamation End If End With End Sub Security.cls Option Explicit Public Function CheckLicense2() As Boolean CheckLicense2 = True End Function When compiled to native code and dumped you get: 00000980 ················ ················ ················ ······@········· 000009C0 <·@·,·@········· ,·@··f····vN·r·· '·?···········@· ··············@· 00000A00 ················ ··@·······@····· ··@·····t·@····· ················ 00000A40 ··@·····L·@····· ········|·@····· p·@············· <·@·Module1·Secu 00000A80 rity····Project1 ················ +=····h··8··+3q· ·-··|>·C·····\·· 00000AC0 *=····h··8··+3q· ······bM··j··$2R !=····h··8··+3q· Class···P··gv··· 00000B00 ·3··+3o·VBIntern al····@········· ··········@·4#@· ··········2·Chec 00000B40 kLicense2·····@· ············O·k· ········F·a·i·l· e·d·····VBA6.DLL 00000B80 ····__vbaFreeObj ····__vbaObjSetA ddref···__vbaFre eVarList····__vb 00000BC0 aVarDup·__vbaHre sultCheckObj···· __vbaNew····__vb aObjSet·······@· 00000C00 ····`·@········· ·······`··@····· ·········#······ ··@···········@· 00000C40 ················ ······@···@·8#@· ······@········· ··········@····· Note that both Security and CheckLicense2 appear in the dump of the compiled EXE. However CheckSecurity1 does not!