([Code Obfuscation
Renames all metadata constructs to short, meaningless, unprintable or incomprehensible names, so making source code extremely difficult to read and understand. Learn More
Control Flow Obfuscation
Hides the control flow information of the program by transforming exiting code flow patterns to semantically equivalent constructs and convert into spaghetti code. Learn More
User String Encryption
Encrypts required literal strings. So hacker’s or attacker’s search will come up empty because the original string is nowhere to be found in the code. Only encrypted version is present.Learn More
MSIL Code Encryption
Encrypts MSIL code to protect the body of the methods, leaving the method body code unreadable. Learn More
Encrypt Resources
Encrypts resources and compress them so that can’t be determined if the assembly is altered or decompiled. At runtime, when required the resources are automatically decrypted. Learn More
Anti Debug
Implements strong anti-debugging schemes into the protected assemblies to prevent debigging of the code. Learn More
Anti Tamper
Prevents assembly from being tampered or modified by hacker tools. Also validates string-name signatures automatically even if strong name bypass feature is enabled.Learn More
Anti - ILDASM
Suppresses decompilation for decompilation tool ILDASM, and it report that can’t open the protected assemblies. Learn More
Anti - Reflection
Prevents reflectors and decompilers from being reflected or decompiled the assembly or even open the assembly.Learn More)