The same questions about internal and private function parameter names and local variables.ģ. Is there any method (deobfuscation, process dumping, debugging etc) to recover sources of internal and private functions (which are not called from public functions) without extensive and long work? If it is possible - please specify the method.Ģ. Thereby we have several questions (It is implicated that analyzed exe (or dll) was obfuscated with SmartAssembly).ġ. We deobfuscate result exe and dll with de4dot. At the moment we are testing SmartAssembly 6. In other words it must be easier to develop application on your own, than to use our sources restored from exe (or dll). Our main task is to make exe (or dll) analysis for getting original source code structure as complicated as possible. We want to protect our source code from using once more with somebody else. Hello! We are caring experiments with several obfuscators.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |