Obfuscation Presets

Choose from pre-configured presets or customize your obfuscation settings

Light

Basic protection with minimal overhead (5-10%)

Obfuscation Cycles:1
Bogus Code %:10

Techniques:

  • Control Flow Obfuscation
  • String Encryption

Medium

Balanced security and performance (15-25%)

Obfuscation Cycles:3
Bogus Code %:30

Techniques:

  • Control Flow Obfuscation
  • String Encryption
  • Bogus Code Insertion

Heavy

Maximum protection with higher overhead (50-200%)

Obfuscation Cycles:5
Bogus Code %:50

Techniques:

  • Control Flow Obfuscation
  • String Encryption
  • Bogus Code Insertion
  • + 4 more

Custom

Full control over all obfuscation options

Obfuscation Cycles:Configurable
Bogus Code %:Configurable

Techniques:

  • All techniques available

All Obfuscation Techniques

Basic Techniques

Control Flow Obfuscation

Inserts opaque predicates and complex control flow structures to confuse static analysis

String Encryption

Encrypts string literals using RC4/PBKDF2 encryption with lazy decryption

Bogus Code Insertion

Inserts meaningless instructions that never execute but confuse analysis

Fake Loop Insertion

Creates dead loops with false conditions to increase complexity

Advanced Techniques

Instruction Substitution

Replaces simple operations with complex equivalent expressions

Control Flow Flattening

Transforms natural control flow into switch-based dispatcher

Mixed Boolean Arithmetic (MBA)

Replaces arithmetic operations with boolean algebra equivalents

Indirect Function Calls

Replaces direct function calls with indirect calls through function pointers

Constant Obfuscation

Obfuscates numeric constants using complex expressions

Security Techniques

Anti-Debugging

Detects and responds to debugger presence using RDTSC, hardware breakpoints, and PEB checks

Anti-Tampering

Adds integrity checks to detect code modification

Anti-Analysis

Detects common analysis tools and responds accordingly

Elite Techniques

Code Virtualization

Transforms native instructions into bytecode for custom VM

Polymorphic Code

Creates multiple variants of the same function with runtime dispatcher

Metamorphic Transforms

Applies code transformations that change on each execution

Dynamic Obfuscation

Applies runtime obfuscation techniques