obfuscated » Page 2 » Developer.Team

JEB Decompiler for Android v3.7.0.201909272058 - Reverse Engineering for Professionals

JEB Decompiler for Android v3.7.0.201909272058 - Reverse Engineering for Professionals
JEB Decompiler for Android v3.7.0.201909272058 - Reverse Engineering for Professionals


Cut down on costly reverse engineering time: decompile obfuscated APKs, examine Java code and
debug closed-source apps in minutes. Our modular back-end, coupled with a powerful UI
front-end for desktop platforms, allow refactoring operation and scripting to automate
complex tasks.
Read more

Agile.Net Obfuscator 6.6.0.11

Agile.Net Obfuscator 6.6.0.11
Agile.Net Obfuscator 6.6.0.11


Agile.NET obfuscator goes beyond traditional obfuscation methods. In addition to renaming your metadata entities, it also supports advanced obfuscation methods that will harden your overall protection scheme and foil reverse engineering altogether. Agile.NET obfuscator renames all metadata constructs, this includes namespaces, class names, method signatures and fields as well as methods implementation and string values of your assembly. Renaming scheme includes 'unreadable chars' scheme, this method will transform classes, methods and field names to unprintable unicode chars. When decompiled, the result is an extremely difficult to understand source code. Since unprintable chars are used it won't be possible to compile the sources produced after decompilation.
Read more

Agile.Net Obfuscator 6.6.0.1

Agile.Net Obfuscator 6.6.0.1
Agile.Net Obfuscator 6.6.0.1


Agile.NET obfuscator goes beyond traditional obfuscation methods. In addition to renaming your metadata entities, it also supports advanced obfuscation methods that will harden your overall protection scheme and foil reverse engineering altogether. Agile.NET obfuscator renames all metadata constructs, this includes namespaces, class names, method signatures and fields as well as methods implementation and string values of your assembly. Renaming scheme includes 'unreadable chars' scheme, this method will transform classes, methods and field names to unprintable unicode chars. When decompiled, the result is an extremely difficult to understand source code. Since unprintable chars are used it won't be possible to compile the sources produced after decompilation.
Read more

Babel Obfuscator v4.0.0.0

Babel Obfuscator v4.0.0.0
Babel Obfuscator v4.0.0.0


Babel Obfuscator is a powerful protection tool for the Microsoft .NET Framework. Programs written in .NET languages, like C# and Visual Basic .NET, are normally easy to reverse engineer because they compile to MSIL (Microsoft Intermediate Language), a CPU-independent instruction set that is embedded into .NET assemblies, along with metadata allowing the reconstruction of original source code. Babel Obfuscator is able to transform assemblies in order to conceal the code, so that reversing is extremely difficult. This transformation process is called obfuscation.
Read more

JEB Decompiler 2.3.12

JEB Decompiler 2.3.12
JEB Decompiler 2.3.12


Decompile and debug binary code. Break down and analyze document files.Reverse engineering is a complex and lengthy task. Use the right software for the job and cut down on expensive man-hours. JEB is a modular reverse engineering platform for professionals. Its extensible nature allows reverse engineers to perform disassembly, decompilation, debugging, and analysis of code and document files, manually or as part of an analysis pipeline.
Read more

Agile.Net Obfuscator 6.4.0.31 Modified

Agile.Net Obfuscator 6.4.0.31 Modified
Agile.Net Obfuscator 6.4.0.31 Modified


Agile.NET obfuscator goes beyond traditional obfuscation methods. In addition to renaming your metadata entities, it also supports advanced obfuscation methods that will harden your overall protection scheme and foil reverse engineering altogether. Agile.NET obfuscator renames all metadata constructs, this includes namespaces, class names, method signatures and fields as well as methods implementation and string values of your assembly. Renaming scheme includes 'unreadable chars' scheme, this method will transform classes, methods and field names to unprintable unicode chars. When decompiled, the result is an extremely difficult to understand source code. Since unprintable chars are used it won't be possible to compile the sources produced after decompilation.
Read more