Obfuscation
Browse 32 obfuscation tools
FEATURED
SDN-based moving target defense that obfuscates network topology and traffic.
Revelo is an experimental Javascript deobfuscator tool with features to analyze and deobfuscate Javascript code.
AI workflow that detects malicious PowerShell activity and privilege escalation.
Firmware & software protection against reverse engineering for embedded systems.
Python3 code protection against reverse engineering via opcode obfuscation.
Binary-level firmware protection for embedded systems, no source code needed.
Network anonymization solution using multi-path routing & traffic obfuscation
C# obfuscation & encryption tool for .NET, MAUI, and Xamarin apps
JavaScript obfuscation tool for protecting code from reverse engineering
Codeless mobile app protection platform for Android and iOS applications
Mobile app security platform with threat detection and response capabilities
Android app protection tool with obfuscation, encryption, and RASP
Trace-based disassembler for analyzing obfuscated and packed binaries
A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.
Statistical renaming, Type inference, and Deobfuscation tool for JavaScript code.
steg86 is a steganographic tool that hides information within x86 and AMD64 binary executables without affecting their performance or file size.
A PHP-based command and control framework that maintains persistent web server access through polymorphic backdoors and HTTP header communication tunneling.
FLOSS is a static analysis tool that automatically extracts and deobfuscates hidden strings from malware binaries using advanced analysis techniques.
A de-obfuscator for M/o/Vfuscator, a notorious obfuscator, designed to reverse the effects of M/o/Vfuscator's obfuscation.
ELFcrypt encrypts ELF binaries with obfuscation and anti-debugging features to protect against reverse engineering.
A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.