SeeUnsharp .NET Obfuscator
Protects the source code of .NET assemblies from decompilers and curious eyes. Renames types and members or seemingly removes all identifiers, hides and encodes all strings, redirects function calls and supports error analysis using FieldLog.
- Have a sophisticated .NET solution?
- And very curious competitors?
- Got something valuable to hide?
- Take action and protect your investment!
Further information is available on the separate project website.
Did you know that your source code can easily be recovered from the compiled .NET assembly? Most of the names from the original source code are stored in the compiled program as metadata: namespaces, classes, methods, parameters, properties, and more. The first tool to decompile an assembly back to C# code was the famous .NET Reflector, and you can use the free ILSpy to convince yourself how easy it is.
Code obfuscation comes to the rescue: SeeUnsharp .NET Obfuscator will scramble everything in the assembly file to make it unreadable and almost impossible to follow! Now your secrets belong to you and your application cannot be modified or hacked anymore with simple edits. Unlike basic file encryption tools, the application remains executable as-is because the computer doesn’t care about the original source names. In a .NET assembly, everything is linked together through internal references and those remain in place.
Oh, and don’t even try to do that yourself in the source code! You really want to write code that can be understood by other developers (including future you). Only when it’s compiled then there must be an end to this descriptiveness.
Statistic data
- Created on 2014-03-14, updated on 2017-01-18.