Malware analysis tools

obfuscar v2.2.21 releases: Open source obfuscation tool for .NET assemblies

Obfuscar is a basic obfuscator for .NET assemblies. It uses massive overloading to rename metadata in .NET assemblies (including the names of methods, properties, events, fields, types, and namespaces) to a minimal set, distinguishable in most cases only by signature.

For example, if a class contains only methods that accept different parameters, they can all be renamed ‘A’. If another method is added to the class that accepts the same parameters as an existing method, it could be named ‘a’.

Basically, Obfuscar scrambles the metadata in a set of assemblies. It renames everything to the minimal set of names that can be used to identify them, given signatures and type information. Since these new names are shorter than the old ones, it also dramatically shrinks the executable size.

Feature

  • Simple Configuration
    Hide everything private, while keeping everything public. You can achieve such simply via default settings.
  • Name Obfuscation
    Hide class/method/property/event names that you don’t want to expose. This is irreversible.
  • String Compression
    String contents can be compressed so that end users won’t easily learn them. However, this is reversible by certain tools.

Changelog v2.2.21

  • Fixed property key generation on generic related types.

Download && Tutorial

Copyright (c) 2007 Ryan Williams
Copyright (c) 2009-2015 Calvin Rien, Lex Li, RemObjects, and other contributors

Anastasis Vasileiadis

PC Technical || Penetration Tester || Ethical Hacker || Cyber Security Expert || Cyber Security Analyst || Information Security Researcher || Malware analyst || Malware Investigator || Reverse Engineering