[Code Obfuscation Renames all metadata constructs to short, meaningless, unprintable or incomprehensible names, so making source code extremely difficult to read and understand. Learn More
Control Flow Obfuscation Hides the control flow information of the program by transforming exiting code flow patterns to semantically equivalent constructs and convert into spaghetti code. Learn More
User String Encryption Encrypts required literal strings. So hacker’s or attacker’s search will come up empty because the original string is nowhere to be found in the code. Only encrypted version is present.Learn More
MSIL Code Encryption Encrypts MSIL code to protect the body of the methods, leaving the method body code unreadable. Learn More
Encrypt Resources Encrypts resources and compress them so that can’t be determined if the assembly is altered or decompiled. At runtime, when required the resources are automatically decrypted. Learn More
Anti Debug Implements strong anti-debugging schemes into the protected assemblies to prevent debigging of the code. Learn More
Anti Tamper Prevents assembly from being tampered or modified by hacker tools. Also validates string-name signatures automatically even if strong name bypass feature is enabled.Learn More
Anti - ILDASM Suppresses decompilation for decompilation tool ILDASM, and it report that can’t open the protected assemblies. Learn More
Anti - Reflection Prevents reflectors and decompilers from being reflected or decompiled the assembly or even open the assembly.Learn More