Loading...
Browse 33 obfuscation tools
Non-attributable VPS with encrypted access and obfuscated IP signatures
Non-attributable VPS with encrypted access and obfuscated IP signatures
Router with dual-encrypted VPN and post-quantum cryptography support
Encrypted network using post-quantum cryptography and randomization
Hardened router with dual-encrypted VPN and post-quantum cryptography
Router with dual-encrypted VPN and post-quantum cryptography support
Encrypted network with isolated non-routable servers and obfuscation
Encrypted network with isolated non-routable servers and obfuscation
Decentralized encrypted mail server with obfuscation capabilities
Decentralized encrypted mail server with obfuscation capabilities
Secure communication platform with post-quantum encryption and decentralization
Secure communication platform with post-quantum encryption and decentralization
PQC-encrypted data storage server with obfuscated network gateway
PQC-encrypted data storage server with obfuscated network gateway
Bare metal hypervisor platform with encrypted VMs and PQC protection
Bare metal hypervisor platform with encrypted VMs and PQC protection
VPN server with post-quantum encryption that obfuscates destination IP addresses
Hardware IP that obfuscates IC logic using camouflage gates for anti-cloning
Hardware IP that obfuscates IC logic using camouflage gates for anti-cloning
Specialized cryptography IP for FHE, LWC, PBC, and WBC implementations
Specialized cryptography IP for FHE, LWC, PBC, and WBC implementations
Android app protection tool with obfuscation, encryption, and RASP
Android app protection tool with obfuscation, encryption, and RASP
Desktop & server app hardening with obfuscation, RASP, and threat monitoring
Desktop & server app hardening with obfuscation, RASP, and threat monitoring
Trace-based disassembler for analyzing obfuscated and packed binaries
Trace-based disassembler for analyzing obfuscated and packed binaries
Skyhook is an HTTP-based file transfer tool that uses obfuscation techniques to evade detection by Intrusion Detection Systems.
Skyhook is an HTTP-based file transfer tool that uses obfuscation techniques to evade detection by Intrusion Detection Systems.
Macro_Pack automates the generation and obfuscation of Office documents and scripts for penetration testing and security assessments.
Macro_Pack automates the generation and obfuscation of Office documents and scripts for penetration testing and security assessments.
A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.
A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.
steg86 is a steganographic tool that hides information within x86 and AMD64 binary executables without affecting their performance or file size.
steg86 is a steganographic tool that hides information within x86 and AMD64 binary executables without affecting their performance or file size.
ELFcrypt encrypts ELF binaries with obfuscation and anti-debugging features to protect against reverse engineering.
ELFcrypt encrypts ELF binaries with obfuscation and anti-debugging features to protect against reverse engineering.
A modular Python tool that obfuscates Android applications by manipulating decompiled smali code, resources, and manifest files without requiring source code access.
A modular Python tool that obfuscates Android applications by manipulating decompiled smali code, resources, and manifest files without requiring source code access.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
Fnord is a pattern extraction tool that analyzes obfuscated code using sliding window techniques to identify frequent byte sequences and generate experimental YARA rules for malware analysis.
A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.
A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance