Crypto Obfuscator For .Net 2009 2.0

LogicNP Software
1.6 MB
Operating System
Windows All
Shareware Trial

Download Links

Crypto Obfuscator For .Net 2009 2.0

Crypto Obfuscator For .Net is a powerful and easy-to-use product for code protection and obfuscation, performance improvement and optimization and improved and simplified deployment of your .Net applications. Crypto Obfuscator renames all your class, field, method, properties, methods, parameter and generic parameter names to totally different strings. It is impossible to determine the original names from the new names. This makes it impossible for someone to try to determine the purpose or functionality of the renamed entity from its name.

Crypto Obfuscator can also rename fields or methods with different signatures to the same name. For example two fields having types int and boolean will be given the same name. Similarly two methods will different parameters will be given the same name. In the case of methods, the method return type is also used in the signature even though high-level languages such as C# and VB.Net do not support overloading by return type. The .Net runtime is able to differentiate between the fields/methods without any problem since the signatures are different. Needless to say, this scheme makes it even harder to reverse-engineer your code.

Crypto Obfuscator can perform strong name verification of the assembly itself even if strong-name verification has been turned OFF on the machine on which the assembly is running or if the assembly has been registered in the verification ‘skip-list’ – this is typically done by hackers or crackers. Furthermore, the strong name verification is done using the original key used to sign the assembly when it was processed by Crypto Obfuscator. Thus, strong name verification fails even if the key is removed or replaced – again something typically done by hackers or crackers.

Crypto Obfuscator’s performs more than 10 advanced heuristic tests to detect if your software is running under a debugger or tracer. If detected, an exception is throw and your software will terminate. Both managed as well as native/unmanaged debuggers (including advanced debuggers such as OllyDbg) are detected. This provides a strong defense against crackers and hackers trying to debug or trace your software for various malicious purposes.


  • Cross Assembly Obfuscation
  • Symbol Renaming
  • Advanced Overload Renaming
  • String Encryption
  • Control Flow Obfuscation
  • ILDASM Protection
  • Anti-Reflection Protection
  • Anti-Decompiler Protection
  • Advanced Tamper Detection
  • Advanced Anti-Debug & Anti-Tracer Protection
  • Resource Encryption & Compression
  • Assembly Embedding, Encryption & Compression
  • Digital Watermarking For License Tracking
  • Metadata Reduction
  • Runtime Performance Optimizations


Please enter your comment!
Please enter your name here