code obfuscation

  1. protectaccount

    PluralSight – Malware Analysis: Identifying and Defeating Code Obfuscation

    Malware authors routinely utilize obfuscation techniques to complicate the analysis of their code. This course will teach you techniques for identifying and defeating code obfuscation so that key characteristics and behaviors can be identified. Malware authors will routinely utilize...
  2. REDEYE

    ✨ UNPACKING PYARMOR OBFUSCATED PYTHON FILE/FILES ✨

    As the title says Everything is explained from here: Check: Hidden content
  3. SUB-ZER0

    OBFUSCATION | A JAVA OBFUSCATOR (GUI)

    Obfuscator A Java Bytecode Obfuscator supporting Flow Obfuscation Line Number Removal Number Obfuscation Optimisation Deobfuscator crasher String Encryption HWID Locking Invoke Dynamic Reference Proxy Member Shuffling & Hiding Obfuscated code Luyten + Procyon Without Obfuscated...
  4. SUB-ZER0

    SHARPJUNK:C# JUNK CODE GENERATOR[GUI]

    Enjoy Github Link: Hidden content Virustotal link VirusTotal
Top