de4dot is an open source (GPLv3) .NET deobfuscator and unpacker written in C#. It will try its best to restore a packed and obfuscated assembly to almost the original assembly. Most of the obfuscation can be completely restored (eg. string encryption), but symbol renaming is impossible to restore since the original names aren't (usually) part of the obfuscated assembly. It uses dnlib to read and write assemblies so make sure you get it or it won't compile. Binaries Get binaries from the build server. It's FREE but there's NO SUPPORT. There's no support. Don't email me if you can't use it or if it fails to deobfuscate a file obfuscated with an updated obfuscator. Instead, try to update de4dot yourself. It's a lot easier than you think. If you can't, search the Internet and you should find a couple of forums where you can ask your question. Features: Here's a pseudo random list of the things it will do depending on what obfuscator was used to obfuscate an assembly: Inline methods. Some obfuscators move small parts of a method to another static method and calls it. Decrypt strings statically or dynamically. Decrypt other constants. Some obfuscators can also encrypt other constants.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.
A command line tool for transparently hiding files within images using LSB steganography.
Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.
A project focusing on deconstructing and utilizing data for security using Python modules like IPython, Pandas, and Scikit Learn.
A demonstration of a method to delete a locked executable or currently running file from disk.
Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.
Automated tool for detecting steganographic content in images, with F5 detection capabilities.
A tool for securely backing up and versioning production secrets or shared passwords
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.